upstream/Support-defining-compilation-date-in-SOURCE_DATE_EPOCH.patch debian/Support-sourcing-a-vimrc.tiny-when-Vim-is-invoked-as-vi.patch debian/Detect-the-rst-filetype-using-the-contents-of-the-file.patch debian/Add-recognition-of-more-LaTeX-commands-for-tex-filetype-d.patch debian/Document-Debian-s-decision-to-disable-modelines-by-defaul.patch patch-8.1.0878-test-for-has-bsd-fails-on-some-BSD-systems.patch patch-8.1.0884-double-check-for-bsd-systems.patch patch-8.1.0948-when-built-without-eval-Vim-clean-produces.patch upstream/deb-release-names.patch patch-8.1.1046-the-secure-variable-is-used-inconsistently.patch patch-8.1.1365-source-command-doesn-t-check-for-the-sandb.patch patch-8.1.1366-using-expressions-in-a-modeline-is-unsafe.patch patch-8.1.1367-can-set-modelineexpr-in-modeline.patch patch-8.1.1368-modeline-test-fails-with-python-but-withou.patch patch-8.1.1382-error-when-editing-test-file.patch patch-8.1.1401-misspelled-mkspellmem-as-makespellmem.patch upstream/patch-8.1.0881-can-execute-shell-commands-in-rvim-through.patch upstream/patch-8.1.0883-missing-some-changes-for-Ex-commands.patch upstream/patch-8.1.0936-may-leak-memory-when-using-vartabstop.patch upstream/patch-8.2.3402-invalid-memory-access-when-using-retab-wit.patch upstream/patch-8.2.3403-memory-leak-for-retab-with-invalid-argumen.patch upstream/patch-8.2.3409-reading-beyond-end-of-line-with-invalid-ut.patch upstream/patch-8.2.3428-using-freed-memory-when-replacing.patch CVE-2021-3872.patch CVE-2021-3927.patch CVE-2021-3928.patch CVE-2021-3974.patch CVE-2021-3984.patch CVE-2021-4019.patch CVE-2021-4069.patch CVE-2021-4192.patch CVE-2021-4193.patch CVE-2022-0213.patch CVE-2022-0261.patch CVE-2022-0319.patch CVE-2022-0351.patch CVE-2022-0359.patch CVE-2022-0361.patch CVE-2022-0368.patch CVE-2022-0408.patch CVE-2022-0413.patch CVE-2022-0417.patch CVE-2022-0443.patch CVE-2022-0554.patch CVE-2022-0572.patch CVE-2022-0685.patch CVE-2022-0714.patch CVE-2022-0729.patch CVE-2022-0943.patch CVE-2022-1154.patch CVE-2022-1616.patch CVE-2022-1720.patch CVE-2022-1851.patch CVE-2022-1898.patch CVE_2022-1968.patch CVE-2022-2285.patch CVE-2022-2304.patch CVE-2022-2598.patch CVE-2022-2946.patch CVE-2022-3099.patch CVE-2022-3134.patch CVE-2022-3234.patch CVE-2022-3324.patch CVE-2022-3705.patch CVE-2022-0318.patch CVE-2022-0392.patch CVE-2022-0629.patch CVE-2022-0696.patch CVE-2022-1619.patch CVE-2022-1621.patch CVE-2022-1785.patch CVE-2022-1897.patch CVE-2022-1942.patch CVE-2022-2000.patch CVE-2022-2129.patch CVE-2022-3235.patch CVE-2022-3256.patch CVE-2022-3352.patch CVE-2022-4141.patch CVE-2023-0054.patch CVE-2023-1175.patch CVE-2023-2610.patch CVE-2023-4752-heap-use-after-free-in-ins_compl_get_exp.patch CVE-2023-4781-heap-buffer-overflow-in-vim_regsub_both.patch progress-linux/0001-syntax-debchangelog.patch progress-linux/0002-syntax-debsources.patch progress-linux/0003-disable-mouse.patch progress-linux/0004-disable-BufReadPost.patch