# exported from git by git-debcherry
0001-Detect-the-rst-filetype-using-the-contents-of-the-fi.patch
0002-Support-sourcing-a-vimrc.tiny-when-Vim-is-invoked-as.patch
0003-Add-recognition-of-more-LaTeX-commands-for-tex-filet.patch
0004-Document-Debian-s-decision-to-disable-modelines-by-d.patch
0005-Support-defining-compilation-date-in-SOURCE_DATE_EPO.patch
0006-debsources.vim-Move-trusty-to-unsupported.patch
ubuntu-grub-syntax.patch
update-upstart-syntax.patch
ubuntu-releases.patch
CVE-2016-1248.patch
CVE-2019-12735.patch
CVE-2017-5953.patch
patch-8.0.0703-illegal-memory-access-with-empty-doau-comm.patch
patch-8.0.0707-freeing-wrong-memory-with-certain-autocomm.patch
patch-8.0.0377-possible-overflow-when-reading-corrupted-u.patch
patch-8.0.0378-possible-overflow-when-reading-corrupted-u.patch
CVE-2017-17087.patch
CVE-2019-20807-pre1.patch
CVE-2019-20807-pre2.patch
CVE-2019-20807-1.patch
CVE-2019-20807-2.patch
CVE-2021-3778.patch
CVE-2021-3796.patch
CVE-2021-3903-pre1.patch
CVE-2021-3903.patch
CVE-2021-3927.patch
CVE-2021-3928.patch
CVE-2021-3984.patch
CVE-2021-4019.patch
CVE-2021-4069.patch
CVE-2021-3973.patch
CVE-2021-3974.patch
CVE-2021-4192.patch
CVE-2022-0261.patch
CVE-2022-1154.patch
CVE-2022-0318-1.patch
CVE-2022-0318-2.patch
CVE-2021-4193.patch
CVE-2022-0213.patch
CVE-2022-0319.patch
CVE-2022-0351.patch
CVE-2022-0359.patch
CVE-2022-0361-pre.patch
CVE-2022-0361.patch
CVE-2022-0368.patch
CVE-2022-0408.patch
CVE-2022-0443.patch
enable-CVE-tests.patch
CVE-2022-0554.patch
CVE-2022-0572.patch
CVE-2022-0685.patch
CVE-2022-0714.patch
CVE-2022-0729.patch
CVE-2022-0943.patch
CVE-2022-1616.patch
CVE-2022-1619.patch
CVE-2022-1620.patch
CVE-2022-1621.patch
CVE-2022-2042.patch
CVE-2022-0413.patch
CVE-2022-1629.patch
CVE-2022-1796.patch
CVE-2022-1735.patch
CVE-2022-1785.patch
CVE-2022-1733.patch
CVE-2022-1898.patch
CVE-2022-1851.patch
CVE-2022-1897.patch
CVE-2022-1942.patch
CVE-2022-1968.patch
CVE-2022-2000.patch
CVE-2022-2207.patch
CVE-2022-2210.patch
CVE-2022-2129.patch
CVE-2022-1674.patch
CVE-2022-1725.patch
CVE-2022-2124.patch
CVE-2022-2125.patch
CVE-2022-2126.patch
CVE-2022-2175-p1.patch
CVE-2022-2175-p2.patch
CVE-2022-2183.patch
CVE-2022-2206.patch
CVE-2022-2304.patch
CVE-2022-2345.patch
CVE-2022-2581.patch
CVE-2022-3099.patch
CVE-2022-3256.patch
CVE-2022-3324.patch
CVE-2022-3591.patch
CVE-2022-47024.patch
CVE-2023-0049.patch
CVE-2023-0054.patch
CVE-2023-0288.patch
CVE-2023-0433.patch
CVE-2023-1170.patch
CVE-2023-1175.patch
FTBFS_fix_test_for_ppc64el_builds.patch
CVE-2023-2609.patch
CVE-2023-2610.patch
fix-tests.patch
set-viminfo.patch
CVE-2022-2257.patch
CVE-2022-2264.patch
CVE-2022-2284.patch
CVE-2022-2285.patch
CVE-2022-2286.patch
CVE-2022-2287.patch
CVE-2022-2289.patch
skip_failing_tests.patch
CVE-2023-4733.patch
CVE-2023-4735.patch
CVE-2023-4750.patch
CVE-2023-4751.patch
CVE-2023-5344.patch
CVE-2023-5441.patch
CVE-2022-1771.patch
CVE-2023-46246.patch
CVE-2023-48231.patch
CVE-2023-48233.patch
CVE-2023-48234.patch
CVE-2023-48235.patch
CVE-2023-48236.patch
CVE-2023-48237.patch
CVE-2024-22667.patch
CVE-2024-41957.patch
CVE-2024-43374.patch
CVE-2024-43802.patch
CVE-2024-47814.patch
CVE-2025-26603.patch
CVE-2025-24014.patch
