diff options
author | graysky | 2018-01-17 12:25:03 -0500 |
---|---|---|
committer | graysky | 2018-01-17 12:25:03 -0500 |
commit | 0fe6882688a7d872a31d6f3b6b29702476e6d0b8 (patch) | |
tree | e81c9162935b3f180e533f3eabdae7347198d34c /PKGBUILD | |
parent | fc14999d1eebb78673e4e0f6a76f3388566336a4 (diff) | |
download | aur-0fe6882688a7d872a31d6f3b6b29702476e6d0b8.tar.gz |
Update to 4.14.14-1
Diffstat (limited to 'PKGBUILD')
-rw-r--r-- | PKGBUILD | 28 |
1 files changed, 9 insertions, 19 deletions
@@ -62,7 +62,7 @@ _localmodcfg= pkgbase=linux-ck _srcname=linux-4.14 -pkgver=4.14.13 +pkgver=4.14.14 pkgrel=1 _ckpatchversion=1 arch=('x86_64') @@ -91,11 +91,9 @@ source=( "$_preck2/df2a75f4864b30011ab6a6f365d9378d8eafa53b.patch" "$_preck2/a79d648fcde72fc98048d4435bc86864a59fd01b.patch" 0001-add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by.patch - 0002-e1000e-Fix-e1000_check_for_copper_link_ich8lan-retur.patch - 0003-dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch - 0004-xfrm-Fix-stack-out-of-bounds-read-on-socket-policy-l.patch - 0005-cgroup-fix-css_task_iter-crash-on-CSS_TASK_ITER_PROC.patch - 0006-drm-i915-edp-Only-use-the-alternate-fixed-mode-if-it.patch + 0002-dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch + 0003-xfrm-Fix-stack-out-of-bounds-read-on-socket-policy-l.patch + 0004-drm-i915-edp-Only-use-the-alternate-fixed-mode-if-it.patch ) validpgpkeys=( 'ABAF11C65A2970B130ABE3C479BE3E4300411886' # Linus Torvalds @@ -103,9 +101,9 @@ validpgpkeys=( ) sha256sums=('f81d59477e90a130857ce18dc02f4fbe5725854911db1e7ba770c7cd350f96a7' 'SKIP' - 'ce897f467e80452f29d7a7a8809e8585ea12192a2c32e4d18578f64b043e802e' + '62d656b98f0dc143216cb9650bd9b96cd83d92925731e9f0bec5eb4d6358e603' 'SKIP' - 'cd4b30f74fef1fb5458e5bdd756a7fc4918a6b4cdf2ac6853316bfc1eb8d0d8b' + '658a768ef37645c4af0d0da825902ede0997090b4b234ffe3742c668ecd00607' 'ae2e95db94ef7176207c690224169594d49445e04249d2499e9d2fbc117a0b21' '75f99f5239e03238f88d1a834c50043ec32b1dc568f2cc291b07d04718483919' 'ad6344badc91ad0630caacde83f7f9b97276f80d26a20619a87952be65492c65' @@ -117,10 +115,8 @@ sha256sums=('f81d59477e90a130857ce18dc02f4fbe5725854911db1e7ba770c7cd350f96a7' '3d4d2506795c4bd914959758f5b69ccf5a4f5a21f5d4bfc87bf0aa3b4b58f4c6' '0dbf2d23df0b5d023794332872b8b346d0c4994576b778396364e803acac4498' 'd8a865a11665424b21fe6be9265eb287ee6d5646261a486954ddf3a4ee87e78f' - '9251c03da9d4b64591d77f490ff144d4ba514e66e74294ada541bf827306c9c4' '6ce57b8dba43db4c6ee167a8891167b7d1e1e101d5112e776113eb37de5c37d8' '1c1f5792c98369c546840950e6569a690cd88e33d4f0931d2b0b5b88f705aa4d' - 'c3d743a0e193294bc5fbae65e7ba69fd997cd8b2ded9c9a45c5151d71d9cfb95' 'ec7342aab478af79a17ff65cf65bbd6744b0caee8f66c77a39bba61a78e6576d') _kernelname=${pkgbase#linux} @@ -135,20 +131,14 @@ prepare() { # disable USER_NS for non-root users by default patch -Np1 -i ../0001-add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by.patch - # https://bugs.archlinux.org/task/56575 - patch -Np1 -i ../0002-e1000e-Fix-e1000_check_for_copper_link_ich8lan-retur.patch - # https://nvd.nist.gov/vuln/detail/CVE-2017-8824 - patch -Np1 -i ../0003-dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch + patch -Np1 -i ../0002-dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch # https://bugs.archlinux.org/task/56605 - patch -Np1 -i ../0004-xfrm-Fix-stack-out-of-bounds-read-on-socket-policy-l.patch - - # https://bugs.archlinux.org/task/56846 - patch -Np1 -i ../0005-cgroup-fix-css_task_iter-crash-on-CSS_TASK_ITER_PROC.patch + patch -Np1 -i ../0003-xfrm-Fix-stack-out-of-bounds-read-on-socket-policy-l.patch # https://bugs.archlinux.org/task/56711 - patch -Np1 -i ../0006-drm-i915-edp-Only-use-the-alternate-fixed-mode-if-it.patch + patch -Np1 -i ../0004-drm-i915-edp-Only-use-the-alternate-fixed-mode-if-it.patch # fix naming schema in EXTRAVERSION of ck patch set sed -i -re "s/^(.EXTRAVERSION).*$/\1 = /" "../${_ckpatchname}" |