summaryrefslogtreecommitdiffstats
path: root/debian/patches/series
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-08 05:05:20 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-08 05:05:20 +0000
commitd314229aa657bc23c0fc99aa79a347326095b190 (patch)
treee2a542e09db76f34502e20a5f9a8c1a4ef52c420 /debian/patches/series
parentAdding debian version 2:8.1.0875-5+deb10u2. (diff)
downloadvim-fabaed95f31e5655d8d72dcd7baed79b08c872be.tar.xz
vim-fabaed95f31e5655d8d72dcd7baed79b08c872be.zip
Adding debian version 2:8.1.0875-5+deb10u3.debian/2%8.1.0875-5+deb10u3
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/patches/series')
-rw-r--r--debian/patches/series41
1 files changed, 41 insertions, 0 deletions
diff --git a/debian/patches/series b/debian/patches/series
index 9a8f88a..5cb3483 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -21,3 +21,44 @@ upstream/patch-8.2.3402-invalid-memory-access-when-using-retab-wit.patch
upstream/patch-8.2.3403-memory-leak-for-retab-with-invalid-argumen.patch
upstream/patch-8.2.3409-reading-beyond-end-of-line-with-invalid-ut.patch
upstream/patch-8.2.3428-using-freed-memory-when-replacing.patch
+CVE-2021-3872.patch
+CVE-2021-3927.patch
+CVE-2021-3928.patch
+CVE-2021-3974.patch
+CVE-2021-3984.patch
+CVE-2021-4019.patch
+CVE-2021-4069.patch
+CVE-2021-4192.patch
+CVE-2021-4193.patch
+CVE-2022-0213.patch
+CVE-2022-0261.patch
+CVE-2022-0319.patch
+CVE-2022-0351.patch
+CVE-2022-0359.patch
+CVE-2022-0361.patch
+CVE-2022-0368.patch
+CVE-2022-0408.patch
+CVE-2022-0413.patch
+CVE-2022-0417.patch
+CVE-2022-0443.patch
+CVE-2022-0554.patch
+CVE-2022-0572.patch
+CVE-2022-0685.patch
+CVE-2022-0714.patch
+CVE-2022-0729.patch
+CVE-2022-0943.patch
+CVE-2022-1154.patch
+CVE-2022-1616.patch
+CVE-2022-1720.patch
+CVE-2022-1851.patch
+CVE-2022-1898.patch
+CVE_2022-1968.patch
+CVE-2022-2285.patch
+CVE-2022-2304.patch
+CVE-2022-2598.patch
+CVE-2022-2946.patch
+CVE-2022-3099.patch
+CVE-2022-3134.patch
+CVE-2022-3234.patch
+CVE-2022-3324.patch
+CVE-2022-3705.patch