diff options
Diffstat (limited to 'meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend')
-rw-r--r-- | meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend | 57 |
1 files changed, 57 insertions, 0 deletions
diff --git a/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend b/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend index 54ddf246e..0d15f61d7 100644 --- a/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend +++ b/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend @@ -18,6 +18,14 @@ SRC_URI += " \ file://0001-peci-aspeed-Improve-workaround-for-controller-hang.patch \ file://0002-gpio-gpio-aspeed-sgpio-Fix-wrong-hwirq-base-in-irq-h.patch \ file://0003-Add-mux-deselect-support-on-timeout.patch \ + file://CVE-2022-0847.patch \ + file://CVE-2022-48425.patch \ + file://CVE-2023-0386.patch \ + file://CVE-2023-0458.patch \ + file://CVE-2023-2235.patch \ + file://CVE-2023-34256.patch \ + file://CVE-2023-42754.patch \ + file://CVE-2023-5178.patch \ file://CVE-2022-0185.patch \ file://CVE-2021-22600.patch \ file://CVE-2022-24122.patch \ @@ -71,8 +79,57 @@ SRC_URI += " \ file://CVE-2023-2156.patch \ file://CVE-2023-3355.patch \ file://CVE-2023-3357.patch \ + file://CVE-2023-52458.patch \ file://CVE-2022-3566.patch \ file://CVE-2023-3161.patch \ + file://CVE-2022-40982.patch \ + file://CVE-2023-2860.patch \ + file://CVE-2023-31085.patch \ + file://CVE-2023-4004.patch \ + file://CVE-2023-2176.patch \ + file://CVE-2023-45863.patch \ + file://CVE-2021-33631.patch \ + file://CVE-2024-0562.patch \ + file://CVE-2024-0639.patch \ + file://CVE-2024-0775.patch \ + file://CVE-2023-52449.patch \ + file://CVE-2023-52435.patch \ + file://CVE-2021-46933.patch \ + file://CVE-2021-46934.patch \ + file://CVE-2021-46936.patch \ + file://CVE-2021-46923.patch \ + file://CVE-2023-52580.patch \ + file://CVE-2023-52597.patch \ + file://CVE-2023-52598.patch \ + file://CVE-2023-52612.patch \ + file://CVE-2023-52615.patch \ + file://CVE-2023-52619.patch \ + file://CVE-2024-26631.patch \ + file://CVE-2024-26671.patch \ + file://CVE-2024-26679.patch \ + file://CVE-2024-26772.patch \ + file://CVE-2024-26773.patch \ + file://CVE-2024-26774.patch \ + file://CVE-2024-26704.patch \ + file://CVE-2024-26720.patch \ + file://CVE-2024-26735.patch \ + file://CVE-2024-26795.patch \ + file://CVE-2021-47087.patch \ + file://CVE-2023-52467.patch \ + file://CVE-2023-52522.patch \ + file://CVE-2023-52622.patch \ + file://CVE-2024-26676.patch \ + file://CVE-2024-26602.patch \ + file://CVE-2024-26001.patch \ + file://CVE-2024-26686.patch \ + file://CVE-2022-48659.patch \ + file://CVE-2022-48660.patch \ + file://CVE-2022-48672.patch \ + file://CVE-2022-48687.patch \ + file://CVE-2022-48689.patch \ + file://CVE-2024-26900.patch \ + file://CVE-2024-35984.patch \ + file://CVE-2024-36008.patch \ " SRC_URI += "${@bb.utils.contains('IMAGE_FSTYPES', 'intel-pfr', 'file://1000-128MB-flashmap-for-PFR.patch', '', d)}" SRC_URI += "${@bb.utils.contains('EXTRA_IMAGE_FEATURES', 'debug-tweaks', 'file://debug.cfg', '', d)}" |