From d314229aa657bc23c0fc99aa79a347326095b190 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Wed, 8 May 2024 07:05:20 +0200 Subject: Adding debian version 2:8.1.0875-5+deb10u3. Signed-off-by: Daniel Baumann --- debian/patches/series | 41 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) (limited to 'debian/patches/series') diff --git a/debian/patches/series b/debian/patches/series index 9a8f88a..5cb3483 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -21,3 +21,44 @@ upstream/patch-8.2.3402-invalid-memory-access-when-using-retab-wit.patch upstream/patch-8.2.3403-memory-leak-for-retab-with-invalid-argumen.patch upstream/patch-8.2.3409-reading-beyond-end-of-line-with-invalid-ut.patch upstream/patch-8.2.3428-using-freed-memory-when-replacing.patch +CVE-2021-3872.patch +CVE-2021-3927.patch +CVE-2021-3928.patch +CVE-2021-3974.patch +CVE-2021-3984.patch +CVE-2021-4019.patch +CVE-2021-4069.patch +CVE-2021-4192.patch +CVE-2021-4193.patch +CVE-2022-0213.patch +CVE-2022-0261.patch +CVE-2022-0319.patch +CVE-2022-0351.patch +CVE-2022-0359.patch +CVE-2022-0361.patch +CVE-2022-0368.patch +CVE-2022-0408.patch +CVE-2022-0413.patch +CVE-2022-0417.patch +CVE-2022-0443.patch +CVE-2022-0554.patch +CVE-2022-0572.patch +CVE-2022-0685.patch +CVE-2022-0714.patch +CVE-2022-0729.patch +CVE-2022-0943.patch +CVE-2022-1154.patch +CVE-2022-1616.patch +CVE-2022-1720.patch +CVE-2022-1851.patch +CVE-2022-1898.patch +CVE_2022-1968.patch +CVE-2022-2285.patch +CVE-2022-2304.patch +CVE-2022-2598.patch +CVE-2022-2946.patch +CVE-2022-3099.patch +CVE-2022-3134.patch +CVE-2022-3234.patch +CVE-2022-3324.patch +CVE-2022-3705.patch -- cgit v1.2.3