diff --git a/Manifests/Manifest_LAOS-14.1.xml b/Manifests/Manifest_LAOS-14.1.xml index 3419ad0f..9c700fc8 100644 --- a/Manifests/Manifest_LAOS-14.1.xml +++ b/Manifests/Manifest_LAOS-14.1.xml @@ -79,7 +79,6 @@ - diff --git a/Manifests/Manifest_LAOS-15.1.xml b/Manifests/Manifest_LAOS-15.1.xml index 941b258f..adfec7a3 100644 --- a/Manifests/Manifest_LAOS-15.1.xml +++ b/Manifests/Manifest_LAOS-15.1.xml @@ -88,7 +88,6 @@ - diff --git a/Manifests/Manifest_LAOS-16.0.xml b/Manifests/Manifest_LAOS-16.0.xml index c73e2a7d..4098d207 100644 --- a/Manifests/Manifest_LAOS-16.0.xml +++ b/Manifests/Manifest_LAOS-16.0.xml @@ -94,7 +94,6 @@ - @@ -117,7 +116,7 @@ - + diff --git a/Manifests/Manifest_LAOS-17.1.xml b/Manifests/Manifest_LAOS-17.1.xml index ab4fe7a0..19507c44 100644 --- a/Manifests/Manifest_LAOS-17.1.xml +++ b/Manifests/Manifest_LAOS-17.1.xml @@ -91,7 +91,6 @@ - @@ -195,6 +194,7 @@ + diff --git a/Scripts/LineageOS-11.0/Patch.sh b/Scripts/LineageOS-11.0/Patch.sh index ac992bd7..7daf12e7 100644 --- a/Scripts/LineageOS-11.0/Patch.sh +++ b/Scripts/LineageOS-11.0/Patch.sh @@ -210,7 +210,6 @@ deblobAudio; #Fixes #Fix broken options enabled by hardenDefconfig() -#sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/msm/arch/arm/configs/lineageos_*_defconfig; sed -i "s/# CONFIG_COMPAT_BRK is not set/CONFIG_COMPAT_BRK=y/" kernel/zte/msm8930/arch/arm/configs/msm8960-nex_defconfig; # #END OF DEVICE CHANGES diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_fugu.sh deleted file mode 100644 index 367e601b..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_fugu.sh +++ /dev/null @@ -1,525 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/asus/fugu" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6368/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6376/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7026/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0038/^3.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0049/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0100/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0155/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0206/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0206/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1690/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1737/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1738/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1739/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2523/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2568/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2673/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2706/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3144/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3673/^3.17.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4608/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4943/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6410/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7145/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7825/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7843/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7970/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8884/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9683/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9710/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9715/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9922/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9922/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9940/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0239/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2666/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4036/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/^4.0.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4692/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5697/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8019/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9004/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5829/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9794/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0449/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0571/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0573/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5897/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6214/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14.79/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8890/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9076/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10661/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15121/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/^5.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/^5.1.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p521" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh deleted file mode 100644 index fb50b269..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ /dev/null @@ -1,279 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/cyanogen/msm8916" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14881/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15814/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11918/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p275" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_cyanogen_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_cyanogen_msm8974.sh deleted file mode 100644 index 70831cf5..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_cyanogen_msm8974.sh +++ /dev/null @@ -1,523 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/cyanogen/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0046-0047.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0077-0078.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0089-0090.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2119/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2137/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2373/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/^3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2669/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3364/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3400/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3430/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4461/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4467/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4508/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4565/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-5532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6536/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6538/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6539/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6541/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6542/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6548/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6549/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6647/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0216/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0217/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0231/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0268/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0290/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0310/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0311/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0313/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0343/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0913/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1059/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1774/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1792/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1796/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1797/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1798/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1827/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1848/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1928/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1979/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2141/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2146/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2206/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2232/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2237/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2546/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2634/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2635/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2851/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2852/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2892/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2893/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3223/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3233/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3235/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3301/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4162/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4350/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4387/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4512/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4513/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4514/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4515/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6383/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7027/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1444/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1445/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1739/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7822/3.2-^3.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7970/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9731/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9922/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9922/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5364/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8543/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9004/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7915/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8444/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p519" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh deleted file mode 100644 index 95cda44e..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh +++ /dev/null @@ -1,456 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/fairphone/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0046-0047.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0077-0078.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0089-0090.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2119/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2137/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2373/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/^3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2669/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3364/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3400/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3430/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4461/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4467/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4508/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4565/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-5532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6538/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6539/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6541/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6542/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6548/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6549/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6647/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0216/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0217/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0231/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0268/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0290/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0310/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0311/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0313/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0343/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0913/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1059/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1774/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1792/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1796/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1797/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1798/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1827/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1848/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1928/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1979/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2141/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2146/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2206/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2232/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2237/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2546/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2634/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2635/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2851/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2852/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2892/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2893/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3223/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3233/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3235/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3301/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4162/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4350/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4387/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4512/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4513/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4514/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4515/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6383/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7027/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1444/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1445/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0774/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3841/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p452" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_dragon.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_dragon.sh deleted file mode 100644 index c56a69d4..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_dragon.sh +++ /dev/null @@ -1,627 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/dragon" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0085-0086.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0103-0104.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9428/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0239/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1333/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1573/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2672/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3291/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3291/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3291/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3339/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4036/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4178/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4692/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5697/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8539/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/^4.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/^4.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/^4.3/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/^4.3/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8660/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8966/3.15-^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2053/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3044/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3156/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4557/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5400/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/^4.5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/^4.7.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9685/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10200/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0449/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0523/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0825/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2596/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5897/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6214/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6274/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/^4.10.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/^4.10.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7346/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7374/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8064/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8240/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9074/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9076/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10-^4.12.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16-^4.12.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12154/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12192/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14140/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14156/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14340/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16647/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18221/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3575/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8897/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/^5.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p623" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh deleted file mode 100644 index 2c8a7b50..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh +++ /dev/null @@ -1,712 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/marlin" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0032-0033.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0072-0073.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0083-0084.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0085-0086.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0103-0104.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8966/3.15-^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3156/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3906/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4557/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5400/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5854/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5856/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5857/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8483/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/^4.7.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0622/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2596/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5897/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6214/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7346/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7372/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8064/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9074/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9676/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9686/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9687/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9690/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9697/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9700/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9716/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9719/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9722/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11001/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11002/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11013/qcacld-2.0/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/qcacld-2.0/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11025/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11028/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11032/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11034/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11044/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11047/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11048/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11049/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11059/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11091/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11093/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10-^4.12.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16-^4.12.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13077/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13077/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13219/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14140/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14340/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14873/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14891/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/^4.13.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15814/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15847/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15851/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18153/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18221/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18307/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3570/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5899/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5910/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9386/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11276/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2263/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10512/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p708" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh deleted file mode 100644 index d81f3f7e..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh +++ /dev/null @@ -1,462 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/msm" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0002-0003.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0046-0047.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0059-0060.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0089-0090.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2119/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2136/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2137/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2373/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/^3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2669/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3364/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3400/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3430/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4461/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4467/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4508/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4565/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-5532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6538/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6539/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6541/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6542/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6548/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6549/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6647/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0216/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0217/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0231/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0268/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0290/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0310/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0311/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0313/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0343/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0913/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1059/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1774/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1792/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1796/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1797/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1798/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1827/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1848/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1928/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1979/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2141/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2146/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2206/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2232/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2237/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2546/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2634/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2635/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2851/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2852/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2892/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2893/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3223/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3233/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3235/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3301/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4162/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4350/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4387/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4512/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4513/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4514/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4515/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6368/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6383/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7027/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1444/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1445/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6740/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8402/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p458" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_flounder.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_flounder.sh deleted file mode 100644 index f87b6e3c..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_flounder.sh +++ /dev/null @@ -1,299 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/htc/flounder" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.10/0001-Alt.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/^4.0.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0449/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14.79/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9076/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10996/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15121/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/^5.1.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p295" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh deleted file mode 100644 index a912372f..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh +++ /dev/null @@ -1,268 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/htc/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p264" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh deleted file mode 100644 index 56c71b7c..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh +++ /dev/null @@ -1,466 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/huawei/angler" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0083-0084.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0093-0094.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9710/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0239/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2666/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4036/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4170/3.10-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/^4.0.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4692/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5697/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5868/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6136/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0606/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14.79/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9710/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13174/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13303/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15121/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15814/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15851/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18307/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5832/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/^5.1.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p462" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh deleted file mode 100644 index 7f01bc30..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh +++ /dev/null @@ -1,464 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/bullhead" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0083-0084.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0093-0094.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9710/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0239/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2666/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4036/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4170/3.10-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/^4.0.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4692/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5697/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6136/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0606/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14.79/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9710/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13077/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13077/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14903/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15121/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15814/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15851/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18153/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18307/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3587/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5832/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5899/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/^5.1.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p460" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_g3.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_g3.sh deleted file mode 100644 index 2d79af18..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_g3.sh +++ /dev/null @@ -1,279 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/g3" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5347/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p275" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_hammerhead.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_hammerhead.sh deleted file mode 100644 index ad9d7427..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_hammerhead.sh +++ /dev/null @@ -1,433 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/hammerhead" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0002-0003.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0046-0047.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0089-0090.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2119/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2136/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2137/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2373/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/^3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2669/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3364/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3400/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3430/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4461/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4467/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4508/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4565/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-5532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6538/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6539/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6541/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6542/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6548/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6549/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6647/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0216/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0217/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0231/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0268/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0290/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0310/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0311/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0313/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0343/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0913/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1059/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1774/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1792/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1796/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1797/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1798/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1827/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1848/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1928/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1979/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2141/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2146/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2206/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2232/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2237/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2546/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2595/ANY/kernel.msm.git-3d1d825fe450304ce150559a1c5ffba068824629.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2634/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2635/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2851/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2852/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3223/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3233/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3235/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3301/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4162/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4350/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4512/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4513/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4514/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4515/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6368/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6383/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7027/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1444/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1445/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9881/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p429" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_mako.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_mako.sh deleted file mode 100644 index c39a389c..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_mako.sh +++ /dev/null @@ -1,418 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/mako" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0002-0003.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0046-0047.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0089-0090.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2119/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2136/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2137/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2373/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/^3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2669/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3364/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3400/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3430/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4461/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4467/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4508/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4565/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-5532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6538/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6539/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6541/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6542/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6548/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6549/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6647/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0216/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0217/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0231/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0268/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0290/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0310/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0311/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0313/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0343/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0913/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1059/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1774/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1792/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1796/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1797/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1798/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1827/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1848/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1928/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1979/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2141/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2146/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2206/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2232/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2237/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2546/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2634/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2635/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2851/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2852/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3223/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3233/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3235/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3301/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4162/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4350/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4387/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4512/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4513/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4514/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4515/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6368/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6383/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7027/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1444/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1445/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9793/^4.8.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p414" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8974.sh deleted file mode 100644 index 922c1f95..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8974.sh +++ /dev/null @@ -1,235 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8939/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3841/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p231" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8996.sh deleted file mode 100644 index 1799816c..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ /dev/null @@ -1,625 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0032-0033.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0085-0086.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0103-0104.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.18/0002-Alt2.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4557/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5400/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/^4.5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/^4.7.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9806/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2596/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6214/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7346/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8064/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10-^4.12.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16-^4.12.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12154/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12192/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13307/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14140/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14156/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14340/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15537/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/^4.13.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18066/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18221/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3570/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5910/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11276/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2263/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10512/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p621" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_moto_shamu.sh deleted file mode 100644 index c37d15cf..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ /dev/null @@ -1,454 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/moto/shamu" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0206/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2568/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2673/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3182/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3673/^3.17.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4608/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5206/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6410/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7145/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7825/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7843/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7970/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8884/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9683/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9710/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9715/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0239/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2666/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4036/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4170/3.10-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/^4.0.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4692/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5697/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6136/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14.79/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11024/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p450" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8974.sh deleted file mode 100644 index 4f6e1f1f..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8974.sh +++ /dev/null @@ -1,444 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/motorola/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0044-0045.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0046-0047.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0048-0049.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0084-0085.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0089-0090.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2137/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0343/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1059/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1774/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1979/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2232/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2237/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2851/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2852/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2892/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2893/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2895/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3223/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3232/^3.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3232/^3.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3233/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3235/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4162/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4163/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4350/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4387/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4512/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4513/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4514/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4515/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6368/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6383/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7027/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7470/^3.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1444/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1445/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3182/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9731/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3841/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5347/3.4/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5696/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p440" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8996.sh deleted file mode 100644 index fcf2a266..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ /dev/null @@ -1,695 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/motorola/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0032-0033.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0072-0073.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0083-0084.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0085-0086.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0103-0104.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4557/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5400/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/^4.7.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10200/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10284/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10287/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10294/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10295/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0460/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0462/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0576/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0606/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0748/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2596/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6423/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6425/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7346/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7369/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7370/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8064/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8233/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8236/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8242/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8244/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8261/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8262/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8264/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8271/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8272/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9074/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9676/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9677/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9678/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9680/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9682/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9686/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9687/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9691/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9692/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9697/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9699/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9700/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9716/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9719/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9722/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11001/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11002/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/qcacld-2.0/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11025/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11032/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11044/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11047/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11048/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11049/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11059/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11091/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11093/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10-^4.12.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16-^4.12.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13077/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13077/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14340/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14873/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14891/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/^4.13.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15814/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15826/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15847/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15851/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18153/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18221/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18307/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3570/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3598/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11276/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2263/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10512/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10288/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p691" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh deleted file mode 100644 index 9a2605ad..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ /dev/null @@ -1,259 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/nextbit/msm8992" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18153/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p255" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh deleted file mode 100644 index 5a2cff50..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh +++ /dev/null @@ -1,310 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10661/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2328/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p306" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh deleted file mode 100644 index 0e91000c..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh +++ /dev/null @@ -1,253 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/msm8994" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8234/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18153/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p249" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh deleted file mode 100644 index b83c85b9..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ /dev/null @@ -1,568 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0103-0104.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4557/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5400/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5412/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/^4.7.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2596/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7346/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8064/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12154/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12192/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13307/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14140/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14156/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14340/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15537/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/^4.13.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18153/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18221/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5910/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11276/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10512/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14049/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p564" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_jf.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_jf.sh deleted file mode 100644 index 41cf65d9..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_jf.sh +++ /dev/null @@ -1,207 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/samsung/jf" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9410/ANY/msm.git-43b4ff3bf3fbb02e85defcea939629f46506a217.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3854/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10233/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/^4.13/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p203" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_msm8974.sh deleted file mode 100644 index f71cca0f..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_msm8974.sh +++ /dev/null @@ -1,117 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/samsung/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/^4.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p113" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/Functions.sh b/Scripts/LineageOS-14.1/Functions.sh index 6b1b1c7f..6bbb967d 100644 --- a/Scripts/LineageOS-14.1/Functions.sh +++ b/Scripts/LineageOS-14.1/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2018-04-27 patchAllKernels() { - startPatcher "kernel_amazon_hdx-common kernel_asus_grouper kernel_asus_msm8916 kernel_google_msm kernel_htc_msm8994 kernel_lge_msm8992 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_samsung_exynos5420 kernel_samsung_manta kernel_samsung_smdk4412 kernel_samsung_tuna kernel_samsung_universal8890 kernel_zte_msm8996"; + startPatcher "kernel_amazon_hdx-common kernel_asus_grouper kernel_asus_msm8916 kernel_htc_msm8994 kernel_lge_msm8992 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_samsung_exynos5420 kernel_samsung_manta kernel_samsung_smdk4412 kernel_samsung_tuna kernel_samsung_universal8890 kernel_zte_msm8996"; } export -f patchAllKernels; diff --git a/Scripts/LineageOS-14.1/Patch.sh b/Scripts/LineageOS-14.1/Patch.sh index 0074ae68..2310b049 100644 --- a/Scripts/LineageOS-14.1/Patch.sh +++ b/Scripts/LineageOS-14.1/Patch.sh @@ -310,7 +310,6 @@ removeBuildFingerprints; #Fixes #Fix broken options enabled by hardenDefconfig() sed -i "s/# CONFIG_KPROBES is not set/CONFIG_KPROBES=y/" kernel/amazon/hdx-common/arch/arm/configs/*hdx*_defconfig; #Breaks on compile -sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/msm/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile awk -i inplace '!/STACKPROTECTOR/' kernel/lge/msm8992/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile sed -i "s/CONFIG_ARM_SMMU=y/# CONFIG_ARM_SMMU is not set/" kernel/motorola/msm8992/arch/arm64/configs/*defconfig; #Breaks on compile sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/zte/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh deleted file mode 100644 index 3c51f7ab..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ /dev/null @@ -1,248 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/cyanogen/msm8916" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465/3.10/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11918/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p244" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_cyanogen_msm8974.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_cyanogen_msm8974.sh deleted file mode 100644 index 79dab93a..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_cyanogen_msm8974.sh +++ /dev/null @@ -1,255 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/cyanogen/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p251" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_essential_msm8998.sh deleted file mode 100644 index d3fcf140..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_essential_msm8998.sh +++ /dev/null @@ -1,393 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/essential/msm8998" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0174-0175.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0175-0176.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10905/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/4.4/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5898/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5906/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5909/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5910/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11274/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12010/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13920/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2181/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2264/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10538/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14049/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18680/4.4-^4.4.195/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27786/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p389" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh deleted file mode 100644 index c102c70e..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh +++ /dev/null @@ -1,418 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/fairphone/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0046-0047.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0077-0078.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0089-0090.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2119/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2137/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2373/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/^3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2669/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3364/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3400/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3430/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4461/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4467/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4508/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4565/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-5532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6538/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6539/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6541/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6542/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6548/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6549/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0216/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0217/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0231/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0268/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0290/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0310/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0311/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0313/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0343/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0913/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1059/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1774/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1796/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1797/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1798/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1827/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1848/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1928/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1979/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2141/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2146/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2206/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2232/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2237/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2546/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2634/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2635/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2851/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2852/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2892/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2893/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3223/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3233/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3235/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3301/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4162/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4350/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4387/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4512/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4513/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4514/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4515/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6383/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7027/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1444/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1445/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0774/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p414" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_marlin.sh deleted file mode 100644 index 45665925..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_marlin.sh +++ /dev/null @@ -1,508 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/marlin" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0085-0086.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0086-0087.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0089-0090.patch --exclude=Makefile -#git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0098-0099.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0101-0102.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0103-0104.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0047.patch -#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0048.patch -#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3906/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5854/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5856/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5857/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8483/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0622/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7372/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11034/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12154/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12192/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14156/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14340/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15537/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17448/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2263/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10512/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p504" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_msm.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_msm.sh deleted file mode 100644 index d6473c82..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_msm.sh +++ /dev/null @@ -1,259 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/msm" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6740/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p255" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_wahoo.sh deleted file mode 100644 index 8e0224a0..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_wahoo.sh +++ /dev/null @@ -1,552 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/wahoo" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10905/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9699/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11065/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11091/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11472/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12154/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12192/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13293/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14156/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14886/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15537/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/^4.13.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16528/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16649/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18061/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18222/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18222/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18241/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000405/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3574/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3575/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5902/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5903/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5906/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5909/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5910/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8897/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9462/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11842/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11905/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11963/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12010/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13920/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18281/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18-^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2024/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2263/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10538/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18680/4.4-^4.4.195/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p548" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_yellowstone.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_yellowstone.sh deleted file mode 100644 index 0b80ff10..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_yellowstone.sh +++ /dev/null @@ -1,324 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/yellowstone" -#git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0098-0099.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4170/3.10-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/^4.0.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3134/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5696/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5829/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8405/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8466/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0744/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5897/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14.79/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/^4.13.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/^5.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/^5.1.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p320" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_msm8974.sh deleted file mode 100644 index 842742f8..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_msm8974.sh +++ /dev/null @@ -1,270 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/htc/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p266" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_g3.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_g3.sh deleted file mode 100644 index de110c01..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_g3.sh +++ /dev/null @@ -1,281 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/g3" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5347/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p277" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_mako.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_mako.sh deleted file mode 100644 index edca449e..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_mako.sh +++ /dev/null @@ -1,197 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/mako" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6828/^4.7.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7910/^4.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/^4.13/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p193" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8974.sh deleted file mode 100644 index ec0be5c3..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8974.sh +++ /dev/null @@ -1,221 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8939/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p217" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_motorola_msm8974.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_motorola_msm8974.sh deleted file mode 100644 index 3df7208c..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_motorola_msm8974.sh +++ /dev/null @@ -1,296 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/motorola/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5347/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10661/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p292" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_motorola_msm8996.sh deleted file mode 100644 index c2c8f117..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ /dev/null @@ -1,546 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/motorola/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0072-0073.patch --exclude=Makefile -#git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0098-0099.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0103-0104.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10810/^4.11.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/^4.13.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15853/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17449/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18066/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000405/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5832/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5852/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5886/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11276/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2025/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2287/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p542" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh deleted file mode 100644 index 683d6f40..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ /dev/null @@ -1,488 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0098-0099.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0103-0104.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10810/^4.11.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12154/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12190/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12192/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12193/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.18/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14156/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7191/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2025/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2287/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10486/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p484" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh deleted file mode 100644 index bba87fa0..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh +++ /dev/null @@ -1,478 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/msm8998" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10905/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11472/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18075/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18222/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18222/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18241/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000405/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8897/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9417/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9417/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11963/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12010/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13920/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18281/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18-^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2024/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2264/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2330/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10538/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10547/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18680/4.4-^4.4.195/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p474" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh deleted file mode 100644 index 8e34441e..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ /dev/null @@ -1,517 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/sdm845" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11472/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17864/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18222/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18222/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18224/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000405/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/4.4-^4.15.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1108/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1118/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1120/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1129/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8897/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10853/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10853/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/4.4+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11232/^4.10.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12014/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13899/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13905/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14610/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14611/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15471/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16871/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18281/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20961/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18-^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2024/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2279/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2283/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2284/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2301/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2314/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2330/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9500/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9503/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10502/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10530/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10538/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10556/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10572/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10585/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14034/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14049/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14079/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20095/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10853/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -editKernelLocalversion "-dos.p513" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oppo_msm8974.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oppo_msm8974.sh deleted file mode 100644 index 2e6908c0..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oppo_msm8974.sh +++ /dev/null @@ -1,253 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oppo/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0774/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10661/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2326/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2328/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p249" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_samsung_msm8974.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_samsung_msm8974.sh deleted file mode 100644 index 37c07328..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_samsung_msm8974.sh +++ /dev/null @@ -1,118 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/samsung/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/^4.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p114" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_samsung_universal9810.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_samsung_universal9810.sh deleted file mode 100644 index 8e7cce45..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_samsung_universal9810.sh +++ /dev/null @@ -1,398 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/samsung/universal9810" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0133-0134.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0135-0136.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0137-0138.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0150-0151.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0168-0169.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0251-0252.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18241/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18249/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1129/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3575/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11232/^4.10.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14610/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14611/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18281/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2024/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9500/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9503/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18805/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20095/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0056.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0057.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0058.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0059.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0060.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0061.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0062.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0063.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0064.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0065.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0066.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0067.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0068.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0069.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0070.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0071.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0072.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27786/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -editKernelLocalversion "-dos.p394" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh deleted file mode 100644 index 2682a1e7..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ /dev/null @@ -1,514 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/xiaomi/sdm845" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11472/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16911/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17864/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17975/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18222/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18222/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18224/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18344/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000405/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000407/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1087/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/4.4-^4.15.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1093/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1108/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1118/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1120/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1129/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6412/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7995/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8897/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10853/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10853/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/4.4+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11232/^4.10.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12014/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.16-^4.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13899/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13905/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14610/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14611/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15471/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16871/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18281/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18386/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18559/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20961/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000004/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18-^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2024/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2279/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2283/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2301/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2314/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2330/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9500/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9503/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10502/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10530/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10538/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10556/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10572/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10585/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14034/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14049/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14079/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/^4.14.139/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18675/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20095/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10853/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -editKernelLocalversion "-dos.p510" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/Functions.sh b/Scripts/LineageOS-15.1/Functions.sh index 458ddec5..26c48475 100644 --- a/Scripts/LineageOS-15.1/Functions.sh +++ b/Scripts/LineageOS-15.1/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2018-04-27 patchAllKernels() { - startPatcher "kernel_asus_fugu kernel_asus_msm8916 kernel_google_dragon kernel_google_msm kernel_htc_flounder kernel_htc_msm8994 kernel_huawei_angler kernel_lge_bullhead kernel_lge_hammerhead kernel_lge_msm8996 kernel_moto_shamu kernel_nextbit_msm8992 kernel_oneplus_msm8994 kernel_samsung_smdk4412 kernel_zte_msm8996"; + startPatcher "kernel_asus_fugu kernel_asus_msm8916 kernel_google_dragon kernel_htc_flounder kernel_htc_msm8994 kernel_huawei_angler kernel_lge_bullhead kernel_lge_hammerhead kernel_lge_msm8996 kernel_moto_shamu kernel_nextbit_msm8992 kernel_oneplus_msm8994 kernel_samsung_smdk4412 kernel_zte_msm8996"; } export -f patchAllKernels; diff --git a/Scripts/LineageOS-15.1/Patch.sh b/Scripts/LineageOS-15.1/Patch.sh index 19ca34c9..b01f0bd0 100644 --- a/Scripts/LineageOS-15.1/Patch.sh +++ b/Scripts/LineageOS-15.1/Patch.sh @@ -258,7 +258,6 @@ deblobAudio; removeBuildFingerprints; #Fix broken options enabled by hardenDefconfig() -sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/msm/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/lge/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/zte/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_essential_msm8998.sh deleted file mode 100644 index be8c27b1..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_essential_msm8998.sh +++ /dev/null @@ -1,108 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/essential/msm8998" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0257-0258.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0258-0259.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0260-0261.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/4.4/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5906/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5909/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5910/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12010/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13920/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2264/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -editKernelLocalversion "-dos.p104" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fairphone_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fairphone_msm8974.sh deleted file mode 100644 index 866ab15a..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fairphone_msm8974.sh +++ /dev/null @@ -1,399 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/fairphone/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0046-0047.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0077-0078.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.4/3.4.0089-0090.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2119/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2137/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2373/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2390/^3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2669/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3364/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3400/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3412/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3430/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4461/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4467/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4508/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4530/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-4565/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-5532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6537/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6538/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6539/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6541/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6542/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6546/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6548/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6549/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0216/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0217/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0231/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0268/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0290/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0310/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0311/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0313/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0343/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0871/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0913/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1059/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1774/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1796/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1797/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1798/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1826/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1827/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1848/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1928/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1979/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2141/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2146/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2206/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2232/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2237/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2546/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2596-UPSTREAM/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2634/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2635/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2851/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2852/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2888/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2889/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2892/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2893/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2897/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3223/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3233/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3234/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3235/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3301/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4162/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4350/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4387/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4512/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4513/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4514/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4515/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6383/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7027/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1444/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1445/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9090/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7613/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3896/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p395" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh deleted file mode 100644 index 3bdacef3..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh +++ /dev/null @@ -1,405 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/fairphone/sdm632" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18224/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1129/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14610/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14611/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14678/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15471/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15572/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16871/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9500/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9503/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10556/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10564/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10572/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14088/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20095/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3680/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14088/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -editKernelLocalversion "-dos.p401" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh deleted file mode 100644 index a662a796..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ /dev/null @@ -1,356 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/fxtec/msm8998" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0154-0155.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0170-0171.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10905/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13098/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13100/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18281/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2024/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.4/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18680/4.4-^4.4.195/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13096/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p352" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_bonito.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_bonito.sh deleted file mode 100644 index 38862eef..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_bonito.sh +++ /dev/null @@ -1,434 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/bonito" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0125-0126.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0133-0134.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0137-0138.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0150-0151.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0168-0169.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1129/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9462/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13899/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13899/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14610/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14611/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15471/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2181/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2279/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2283/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2284/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2287/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2301/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2308/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2314/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2330/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9447/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9448/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9451/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9500/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9503/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10486/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10502/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10530/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10538/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10556/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10572/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10585/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14072/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14079/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20095/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3680/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11174/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -editKernelLocalversion "-dos.p430" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_crosshatch.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_crosshatch.sh deleted file mode 100644 index cb42bc05..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_crosshatch.sh +++ /dev/null @@ -1,409 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/crosshatch" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0149-0150.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0150-0151.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0156-0157.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0168-0169.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0172-0173.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9462/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11817/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13097/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13899/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13899/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2181/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2279/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2283/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2284/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2287/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2301/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2314/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9447/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9448/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9451/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9500/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9503/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10486/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10530/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10556/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10565/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10572/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10585/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14049/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14072/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14079/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20095/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3680/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -editKernelLocalversion "-dos.p405" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_marlin.sh deleted file mode 100644 index a3e24a8b..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_marlin.sh +++ /dev/null @@ -1,365 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/marlin" -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0048.patch -#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3906/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5854/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5856/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5857/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8483/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0622/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7372/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11034/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14049/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p361" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_msm.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_msm.sh deleted file mode 100644 index 6d11908b..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_msm.sh +++ /dev/null @@ -1,257 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/msm" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6740/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p253" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_wahoo.sh deleted file mode 100644 index 16cb64c4..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_wahoo.sh +++ /dev/null @@ -1,385 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/wahoo" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0170-0171.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10905/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9699/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11065/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11091/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14886/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18061/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3575/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5902/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5906/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12010/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2181/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2263/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18680/4.4-^4.4.195/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p381" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_htc_msm8974.sh deleted file mode 100644 index 1ffca052..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_htc_msm8974.sh +++ /dev/null @@ -1,268 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/htc/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p264" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_g3.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_g3.sh deleted file mode 100644 index 1af845a1..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_g3.sh +++ /dev/null @@ -1,212 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/g3" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5347/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p208" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_mako.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_mako.sh deleted file mode 100644 index e1b48ca7..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_mako.sh +++ /dev/null @@ -1,252 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/mako" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6704/^3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9004/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/^4.5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5829/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6740/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6828/^4.7.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7097/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7097/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8399/^4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8655/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9793/^4.8.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p248" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_msm8974.sh deleted file mode 100644 index e3ad0061..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_lge_msm8974.sh +++ /dev/null @@ -1,214 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8939/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p210" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_moto_shamu.sh deleted file mode 100644 index a7a4fc2c..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_moto_shamu.sh +++ /dev/null @@ -1,172 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/moto/shamu" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4170/3.10-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/^4.0.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/^4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6136/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2181/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p168" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_motorola_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_motorola_msm8974.sh deleted file mode 100644 index 3df7208c..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_motorola_msm8974.sh +++ /dev/null @@ -1,296 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/motorola/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5347/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10661/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p292" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_motorola_msm8996.sh deleted file mode 100644 index 94901b0f..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ /dev/null @@ -1,406 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/motorola/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0121-0122.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15853/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-1999/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2025/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10486/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p402" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_nextbit_msm8992.sh deleted file mode 100644 index cd6c1dce..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ /dev/null @@ -1,257 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/nextbit/msm8992" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18153/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p253" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8994.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8994.sh deleted file mode 100644 index d0e2b4d0..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8994.sh +++ /dev/null @@ -1,209 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/msm8994" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8234/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p205" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8996.sh deleted file mode 100644 index 760e53ee..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ /dev/null @@ -1,406 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0121-0122.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/^4.15.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13098/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13100/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-1999/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2025/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13096/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p402" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh deleted file mode 100644 index 772bdfd4..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ /dev/null @@ -1,410 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/sdm845" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0112-0113.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0150-0151.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18224/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1129/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14610/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14611/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14678/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15471/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15572/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16871/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18281/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2024/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9500/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9503/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14088/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20095/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3680/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14088/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -editKernelLocalversion "-dos.p406" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh deleted file mode 100644 index 6c0d4df6..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ /dev/null @@ -1,433 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/sm8150" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0126-0127.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0130-0131.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0205-0206.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0219-0220.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0056.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0057.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0058.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0059.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0060.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0062.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0063.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0065.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0066.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0067.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0068.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0069.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0070.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0071.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0072.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0073.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0075.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0077.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0078.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0079.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0080.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0081.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1129/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13097/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14610/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14611/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14625/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16882/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18397/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18397/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18397/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18397/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18397/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20669/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-1999/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2279/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2284/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.14/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9455/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9466/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9503/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.14/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.14/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10520/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10530/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10556/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10558/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10572/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10585/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10621/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11085/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12615/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14034/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14034/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14091/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14099/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14100/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14122/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15090/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15099/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15918/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15921/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15925/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.14/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19045/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19058/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19065/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19071/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19075/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19078/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.14/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19526/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19529/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19543/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.14/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.14/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20095/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20811/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.14/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0430/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3630/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3646/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3647/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3694/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-7053/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.14/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10781/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11151/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12657/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.7.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27777/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28941/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch -editKernelLocalversion "-dos.p429" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oppo_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oppo_msm8974.sh deleted file mode 100644 index cd278256..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oppo_msm8974.sh +++ /dev/null @@ -1,252 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oppo/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0774/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10661/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2326/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2328/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p248" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_razer_msm8998.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_razer_msm8998.sh deleted file mode 100644 index 60d7ab2d..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_razer_msm8998.sh +++ /dev/null @@ -1,304 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/razer/msm8998" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0187-0188.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10905/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13098/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13100/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14072/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18680/4.4-^4.4.195/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13096/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p300" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_jf.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_jf.sh deleted file mode 100644 index bc81d45a..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_jf.sh +++ /dev/null @@ -1,266 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/samsung/jf" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4737/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9410/ANY/msm.git-43b4ff3bf3fbb02e85defcea939629f46506a217.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0568/ANY/msm.git-8de3fe39e7c40190f82832253ed5946714e5bff1.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8816/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3854/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10233/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0573/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p262" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_msm8974.sh deleted file mode 100644 index 738bb0e6..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_msm8974.sh +++ /dev/null @@ -1,115 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/samsung/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/^4.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p111" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_yandex_sdm660.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_yandex_sdm660.sh deleted file mode 100644 index 42a996e7..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_yandex_sdm660.sh +++ /dev/null @@ -1,319 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/yandex/sdm660" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10905/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13098/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13100/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2181/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14072/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18680/4.4-^4.4.195/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13096/^4.17.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p315" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_zuk_msm8996.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_zuk_msm8996.sh deleted file mode 100644 index bb9d5d88..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_zuk_msm8996.sh +++ /dev/null @@ -1,307 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/zuk/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0183-0184.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0187-0188.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10905/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10126/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14072/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18680/4.4-^4.4.195/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p303" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/Functions.sh b/Scripts/LineageOS-16.0/Functions.sh index 4a748348..90e64fdc 100644 --- a/Scripts/LineageOS-16.0/Functions.sh +++ b/Scripts/LineageOS-16.0/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2018-04-27 patchAllKernels() { - startPatcher "kernel_asus_fugu kernel_asus_msm8953 kernel_cyanogen_msm8916 kernel_cyanogen_msm8974 kernel_google_msm kernel_google_yellowstone kernel_lge_hammerhead kernel_oneplus_msm8998 kernel_samsung_smdk4412 kernel_xiaomi_sdm845"; + startPatcher "kernel_asus_fugu kernel_asus_msm8953 kernel_cyanogen_msm8916 kernel_cyanogen_msm8974 kernel_google_yellowstone kernel_lge_hammerhead kernel_oneplus_msm8998 kernel_samsung_smdk4412 kernel_xiaomi_sdm845"; } export -f patchAllKernels; diff --git a/Scripts/LineageOS-16.0/Patch.sh b/Scripts/LineageOS-16.0/Patch.sh index 68b651f2..cfe4e35b 100644 --- a/Scripts/LineageOS-16.0/Patch.sh +++ b/Scripts/LineageOS-16.0/Patch.sh @@ -261,7 +261,6 @@ removeBuildFingerprints; #Fix broken options enabled by hardenDefconfig() sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/asus/msm8953/arch/arm64/configs/*_defconfig; #Breaks on compile -sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/msm/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/yellowstone/arch/arm*/configs/*_defconfig; #Breaks on compile sed -i 's/YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l*; #Fix builds with GCC 10 diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh.disabled b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh.disabled deleted file mode 100644 index d5f701b0..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh.disabled +++ /dev/null @@ -1,216 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/motorola/msm8916" -#git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0050-0051.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0052-0053.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0053-0054.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/^3.16.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/^3.17.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/^3.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3673/^3.17.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/^3.17.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7145/^3.16.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7843/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8133/^3.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/^3.17.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8884/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/^3.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/^3.18.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9730/^3.18.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/^3.18.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/^3.19.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/^3.19.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/^3.19.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/^3.19.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/^4.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/^4.2.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/^4.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/^4.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/^4.0.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/^4.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/^4.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/^4.1.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/^4.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/^4.5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/^4.8.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/^4.8.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/^4.7.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/^4.10.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/^4.10.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/^4.15.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7273/^4.15.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/^5.3.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8649/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -editKernelLocalversion "-dos.p212" -cd "$DOS_BUILD_BASE"