-Patch8: %{name}-configure-xend.patch
-Patch9: %{name}-initscript.patch
-Patch10: %{name}-quemu-softloat-c99.patch
-Patch11: %{name}-qemu.patch
-Patch12: %{name}-scripts-locking.patch
-Patch13: %{name}-close_lockfd_after_lock_attempt.patch
-Patch14: %{name}-librt.patch
-Patch15: %{name}-ulong.patch
-Patch16: %{name}-doc.patch
-Patch100: CVE-2013-1918-1
-Patch101: CVE-2013-1918-2
-Patch102: CVE-2013-1918-3
-Patch103: CVE-2013-1918-4
-Patch104: CVE-2013-1918-5
-Patch105: CVE-2013-1918-6
-Patch106: CVE-2013-1918-7
-Patch107: CVE-2013-1952
-Patch108: CVE-2013-2072
-Patch109: CVE-2013-2076
-Patch110: CVE-2013-2077
-Patch111: CVE-2013-2078
-#CVE-2013-2194 XEN XSA-55 integer overflows
-#CVE-2013-2195 XEN XSA-55 pointer dereferences
-#CVE-2013-2196 XEN XSA-55 other problems
-Patch112: 0001-libelf-abolish-libelf-relocate.c.patch
-Patch113: 0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch
-Patch114: 0003-libxc-Fix-range-checking-in-xc_dom_pfn_to_ptr-etc.patch
-Patch115: 0004-libelf-add-struct-elf_binary-parameter-to-elf_load_i.patch
-Patch116: 0005-libelf-abolish-elf_sval-and-elf_access_signed.patch
-Patch117: 0006-libelf-move-include-of-asm-guest_access.h-to-top-of-.patch
-Patch118: 0007-libelf-xc_dom_load_elf_symtab-Do-not-use-syms-uninit.patch
-Patch119: 0008-libelf-introduce-macros-for-memory-access-and-pointe.patch
-Patch120: 0009-tools-xcutils-readnotes-adjust-print_l1_mfn_valid_no.patch
-Patch121: 0010-libelf-check-nul-terminated-strings-properly.patch
-Patch122: 0011-libelf-check-all-pointer-accesses.patch
-Patch123: 0012-libelf-Check-pointer-references-in-elf_is_elfbinary.patch
-Patch124: 0013-libelf-Make-all-callers-call-elf_check_broken.patch
-Patch125: 0014-libelf-use-C99-bool-for-booleans.patch
-Patch126: 0015-libelf-use-only-unsigned-integers.patch
-Patch127: 0016-libelf-check-loops-for-running-away.patch
-Patch128: 0017-libelf-abolish-obsolete-macros.patch
-Patch129: 0018-libxc-Add-range-checking-to-xc_dom_binloader.patch
-Patch130: 0019-libxc-check-failure-of-xc_dom_-_to_ptr-xc_map_foreig.patch
-Patch131: 0020-libxc-check-return-values-from-malloc.patch
-Patch132: 0021-libxc-range-checks-in-xc_dom_p2m_host-and-_guest.patch
-Patch133: 0022-libxc-check-blob-size-before-proceeding-in-xc_dom_ch.patch
-Patch134: 0023-libxc-Better-range-check-in-xc_dom_alloc_segment.patch
-Patch135: CVE-2013-2211
-Patch136: CVE-2013-1432
+Patch9: %{name}-gawk.patch
+Patch10: %{name}-qemu.patch
+Patch12: %{name}-doc.patch
+Patch13: %{name}-paths.patch
+Patch14: %{name}-no_fetcher.patch
+Patch15: odd-glib2-fix.patch
+Patch16: %{name}-gmp-abi.patch
+Patch18: %{name}-make.patch
+Patch19: %{name}-no_Werror.patch
+Patch22: %{name}-stubdom-build.patch
+Patch23: link.patch
+Patch24: %{name}-systemd.patch
+Patch25: fix-misleading-indentation.patch
+Patch26: deprecated-readdir_r.patch
+Patch27: ipxe-build.patch
+Patch28: sysmacros.patch
+Patch29: unused-function.patch