diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-08 05:05:20 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-08 05:05:20 +0000 |
commit | d314229aa657bc23c0fc99aa79a347326095b190 (patch) | |
tree | e2a542e09db76f34502e20a5f9a8c1a4ef52c420 /debian/patches/series | |
parent | Adding debian version 2:8.1.0875-5+deb10u2. (diff) | |
download | vim-debian/2%8.1.0875-5+deb10u3.tar.xz vim-debian/2%8.1.0875-5+deb10u3.zip |
Adding debian version 2:8.1.0875-5+deb10u3.debian/2%8.1.0875-5+deb10u3
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/patches/series')
-rw-r--r-- | debian/patches/series | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/debian/patches/series b/debian/patches/series index 9a8f88a..5cb3483 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -21,3 +21,44 @@ upstream/patch-8.2.3402-invalid-memory-access-when-using-retab-wit.patch upstream/patch-8.2.3403-memory-leak-for-retab-with-invalid-argumen.patch upstream/patch-8.2.3409-reading-beyond-end-of-line-with-invalid-ut.patch upstream/patch-8.2.3428-using-freed-memory-when-replacing.patch +CVE-2021-3872.patch +CVE-2021-3927.patch +CVE-2021-3928.patch +CVE-2021-3974.patch +CVE-2021-3984.patch +CVE-2021-4019.patch +CVE-2021-4069.patch +CVE-2021-4192.patch +CVE-2021-4193.patch +CVE-2022-0213.patch +CVE-2022-0261.patch +CVE-2022-0319.patch +CVE-2022-0351.patch +CVE-2022-0359.patch +CVE-2022-0361.patch +CVE-2022-0368.patch +CVE-2022-0408.patch +CVE-2022-0413.patch +CVE-2022-0417.patch +CVE-2022-0443.patch +CVE-2022-0554.patch +CVE-2022-0572.patch +CVE-2022-0685.patch +CVE-2022-0714.patch +CVE-2022-0729.patch +CVE-2022-0943.patch +CVE-2022-1154.patch +CVE-2022-1616.patch +CVE-2022-1720.patch +CVE-2022-1851.patch +CVE-2022-1898.patch +CVE_2022-1968.patch +CVE-2022-2285.patch +CVE-2022-2304.patch +CVE-2022-2598.patch +CVE-2022-2946.patch +CVE-2022-3099.patch +CVE-2022-3134.patch +CVE-2022-3234.patch +CVE-2022-3324.patch +CVE-2022-3705.patch |