0004-Point-scripts-location-to-libdir.patch -p1
0005-Only-generate-an-RPATH-entry-if-LD_RUN_PATH-is-not-e.patch -p1
0006-don-t-let-the-distro-compiler-point-to-the-wrong-ins.patch -p1
0007-warn-for-uses-of-system-directories-when-cross-linki.patch -p1
0008-fix-the-incorrect-assembling-for-ppc-wait-mnemonic.patch -p1
0009-Use-libtool-2.4.patch -p1
0010-Fix-rpath-in-libtool-when-sysroot-is-enabled.patch -p1
0011-sync-with-OE-libtool-changes.patch -p1
0012-Check-for-clang-before-checking-gcc-version.patch -p1
0013-Avoid-as-info-race-condition.patch -p1
0014-CVE-2019-1010204.patch -p1
0015-CVE-2022-38533.patch -p1
0016-CVE-2022-35205.patch -p1
0017-CVE-2022-38127-1.patch -p1
0017-CVE-2022-38127-2.patch -p1
0017-CVE-2022-38127-3.patch -p1
0017-CVE-2022-38127-4.patch -p1
0018-CVE-2022-38128-1.patch -p1
0018-CVE-2022-38128-2.patch -p1
0018-CVE-2022-38128-3.patch -p1
0019-CVE-2022-4285.patch -p1
0020-CVE-2023-22608-1.patch -p1
0020-CVE-2023-22608-2.patch -p1
0020-CVE-2023-22608-3.patch -p1
0021-CVE-2023-1579-1.patch -p1
0021-CVE-2023-1579-2.patch -p1
0021-CVE-2023-1579-3.patch -p1
0021-CVE-2023-1579-4.patch -p1
0022-CVE-2023-25584-1.patch -p1
0022-CVE-2023-25584-2.patch -p1
0022-CVE-2023-25584-3.patch -p1
0023-CVE-2023-25585.patch -p1
0026-CVE-2023-1972.patch -p1
0025-CVE-2023-25588.patch -p1
0027-CVE-2022-47008.patch -p1
0028-CVE-2022-47011.patch -p1
0029-CVE-2022-48065-1.patch -p1
0029-CVE-2022-48065-2.patch -p1
0029-CVE-2022-48065-3.patch -p1
0030-CVE-2022-44840.patch -p1
0031-CVE-2022-45703-1.patch -p1
0031-CVE-2022-45703-2.patch -p1
0031-CVE-2022-47695.patch -p1
CVE-2022-48063.patch -p1
0032-CVE-2022-47010.patch -p1
0033-CVE-2022-47007.patch -p1
0034-CVE-2022-48064.patch -p1
0035-CVE-2023-39129.patch -p1
0036-CVE-2023-39130.patch -p1
0037-CVE-2024-53589.patch -p1
0038-CVE-2025-0840.patch -p1
0039-CVE-2025-1178.patch -p1
0040-CVE-2025-1180.patch -p1
0040-CVE-2025-1182.patch -p1
0041-CVE-2025-5244.patch -p1
0042-CVE-2025-5245.patch -p1
0043-CVE-2025-7546.patch -p1
0043-CVE-2025-7545.patch -p1
