summaryrefslogtreecommitdiff
path: root/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend
diff options
context:
space:
mode:
Diffstat (limited to 'meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend')
-rw-r--r--meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend57
1 files changed, 57 insertions, 0 deletions
diff --git a/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend b/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend
index 54ddf246e..0d15f61d7 100644
--- a/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend
+++ b/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend
@@ -18,6 +18,14 @@ SRC_URI += " \
file://0001-peci-aspeed-Improve-workaround-for-controller-hang.patch \
file://0002-gpio-gpio-aspeed-sgpio-Fix-wrong-hwirq-base-in-irq-h.patch \
file://0003-Add-mux-deselect-support-on-timeout.patch \
+ file://CVE-2022-0847.patch \
+ file://CVE-2022-48425.patch \
+ file://CVE-2023-0386.patch \
+ file://CVE-2023-0458.patch \
+ file://CVE-2023-2235.patch \
+ file://CVE-2023-34256.patch \
+ file://CVE-2023-42754.patch \
+ file://CVE-2023-5178.patch \
file://CVE-2022-0185.patch \
file://CVE-2021-22600.patch \
file://CVE-2022-24122.patch \
@@ -71,8 +79,57 @@ SRC_URI += " \
file://CVE-2023-2156.patch \
file://CVE-2023-3355.patch \
file://CVE-2023-3357.patch \
+ file://CVE-2023-52458.patch \
file://CVE-2022-3566.patch \
file://CVE-2023-3161.patch \
+ file://CVE-2022-40982.patch \
+ file://CVE-2023-2860.patch \
+ file://CVE-2023-31085.patch \
+ file://CVE-2023-4004.patch \
+ file://CVE-2023-2176.patch \
+ file://CVE-2023-45863.patch \
+ file://CVE-2021-33631.patch \
+ file://CVE-2024-0562.patch \
+ file://CVE-2024-0639.patch \
+ file://CVE-2024-0775.patch \
+ file://CVE-2023-52449.patch \
+ file://CVE-2023-52435.patch \
+ file://CVE-2021-46933.patch \
+ file://CVE-2021-46934.patch \
+ file://CVE-2021-46936.patch \
+ file://CVE-2021-46923.patch \
+ file://CVE-2023-52580.patch \
+ file://CVE-2023-52597.patch \
+ file://CVE-2023-52598.patch \
+ file://CVE-2023-52612.patch \
+ file://CVE-2023-52615.patch \
+ file://CVE-2023-52619.patch \
+ file://CVE-2024-26631.patch \
+ file://CVE-2024-26671.patch \
+ file://CVE-2024-26679.patch \
+ file://CVE-2024-26772.patch \
+ file://CVE-2024-26773.patch \
+ file://CVE-2024-26774.patch \
+ file://CVE-2024-26704.patch \
+ file://CVE-2024-26720.patch \
+ file://CVE-2024-26735.patch \
+ file://CVE-2024-26795.patch \
+ file://CVE-2021-47087.patch \
+ file://CVE-2023-52467.patch \
+ file://CVE-2023-52522.patch \
+ file://CVE-2023-52622.patch \
+ file://CVE-2024-26676.patch \
+ file://CVE-2024-26602.patch \
+ file://CVE-2024-26001.patch \
+ file://CVE-2024-26686.patch \
+ file://CVE-2022-48659.patch \
+ file://CVE-2022-48660.patch \
+ file://CVE-2022-48672.patch \
+ file://CVE-2022-48687.patch \
+ file://CVE-2022-48689.patch \
+ file://CVE-2024-26900.patch \
+ file://CVE-2024-35984.patch \
+ file://CVE-2024-36008.patch \
"
SRC_URI += "${@bb.utils.contains('IMAGE_FSTYPES', 'intel-pfr', 'file://1000-128MB-flashmap-for-PFR.patch', '', d)}"
SRC_URI += "${@bb.utils.contains('EXTRA_IMAGE_FEATURES', 'debug-tweaks', 'file://debug.cfg', '', d)}"