summaryrefslogtreecommitdiffstats
path: root/debian/patches/series
blob: acb4b8e1884891f63f075d304d92bd2967154de0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
upstream/Support-defining-compilation-date-in-SOURCE_DATE_EPOCH.patch
debian/Support-sourcing-a-vimrc.tiny-when-Vim-is-invoked-as-vi.patch
debian/Detect-the-rst-filetype-using-the-contents-of-the-file.patch
debian/Add-recognition-of-more-LaTeX-commands-for-tex-filetype-d.patch
debian/Document-Debian-s-decision-to-disable-modelines-by-defaul.patch
patch-8.1.0878-test-for-has-bsd-fails-on-some-BSD-systems.patch
patch-8.1.0884-double-check-for-bsd-systems.patch
patch-8.1.0948-when-built-without-eval-Vim-clean-produces.patch
upstream/deb-release-names.patch
patch-8.1.1046-the-secure-variable-is-used-inconsistently.patch
patch-8.1.1365-source-command-doesn-t-check-for-the-sandb.patch
patch-8.1.1366-using-expressions-in-a-modeline-is-unsafe.patch
patch-8.1.1367-can-set-modelineexpr-in-modeline.patch
patch-8.1.1368-modeline-test-fails-with-python-but-withou.patch
patch-8.1.1382-error-when-editing-test-file.patch
patch-8.1.1401-misspelled-mkspellmem-as-makespellmem.patch
upstream/patch-8.1.0881-can-execute-shell-commands-in-rvim-through.patch
upstream/patch-8.1.0883-missing-some-changes-for-Ex-commands.patch
upstream/patch-8.1.0936-may-leak-memory-when-using-vartabstop.patch
upstream/patch-8.2.3402-invalid-memory-access-when-using-retab-wit.patch
upstream/patch-8.2.3403-memory-leak-for-retab-with-invalid-argumen.patch
upstream/patch-8.2.3409-reading-beyond-end-of-line-with-invalid-ut.patch
upstream/patch-8.2.3428-using-freed-memory-when-replacing.patch
CVE-2021-3872.patch
CVE-2021-3927.patch
CVE-2021-3928.patch
CVE-2021-3974.patch
CVE-2021-3984.patch
CVE-2021-4019.patch
CVE-2021-4069.patch
CVE-2021-4192.patch
CVE-2021-4193.patch
CVE-2022-0213.patch
CVE-2022-0261.patch
CVE-2022-0319.patch
CVE-2022-0351.patch
CVE-2022-0359.patch
CVE-2022-0361.patch
CVE-2022-0368.patch
CVE-2022-0408.patch
CVE-2022-0413.patch
CVE-2022-0417.patch
CVE-2022-0443.patch
CVE-2022-0554.patch
CVE-2022-0572.patch
CVE-2022-0685.patch
CVE-2022-0714.patch
CVE-2022-0729.patch
CVE-2022-0943.patch
CVE-2022-1154.patch
CVE-2022-1616.patch
CVE-2022-1720.patch
CVE-2022-1851.patch
CVE-2022-1898.patch
CVE_2022-1968.patch
CVE-2022-2285.patch
CVE-2022-2304.patch
CVE-2022-2598.patch
CVE-2022-2946.patch
CVE-2022-3099.patch
CVE-2022-3134.patch
CVE-2022-3234.patch
CVE-2022-3324.patch
CVE-2022-3705.patch
CVE-2022-0318.patch
CVE-2022-0392.patch
CVE-2022-0629.patch
CVE-2022-0696.patch
CVE-2022-1619.patch
CVE-2022-1621.patch
CVE-2022-1785.patch
CVE-2022-1897.patch
CVE-2022-1942.patch
CVE-2022-2000.patch
CVE-2022-2129.patch
CVE-2022-3235.patch
CVE-2022-3256.patch
CVE-2022-3352.patch