grub2-pc-1:2.04-27.oe1 >  A cMW^^fn_48}ytCks"ƅՊF}jr Xn$UQ'[wXP&ZJ ;Q.h"?52YC|!j䕓>z7ak?:?}k+ķ_zɻ哗 HuRtGvⷠ2Ŝ) ubg; 5xeGQ52ˏӭK=݅@ vBS8hS[Y!v6ebd1adbf3557350f5d3ba423423a510246bf1c764aca59c7e589241377a325fe99c8e3edbed8231ff60b9c17a4f5294e19ab1a8cMW^^f~m.YFʴ ӌ;Z7?O鿫멡0E@ 2m# _s\WZ#%Ω5e79?I6{xsow rAt,$nR'K۱$נxNODz+&ؔB>ߌ4fHwYD’Fmtaq:%ar Ӌ&~GSt帜#nq2RT:enB1 {wzyp@?d   S +MS\h n t    \A(89:BF#GPH\IhXlY|Z[\]^bcdEeJfMlOtluxvzCgrub2-pc2.0427.oe1Bootloader with support for Linux, Multiboot, and more%{desc} This subpackage provides support for pc systems.cLobs-worker-backend-test-x86-0009openEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv3+http://openeuler.orgSystem Environment/Basehttp://www.gnu.org/software/grub/linuxx86_64AcMcMcM../boot/grub2/grub.cfgQrootrootrootrootrootrootgrub2-2.04-27.oe1.src.rpmconfig(grub2-pc)grub2grub2-pcgrub2-pc(x86-64)    config(grub2-pc)dracutdracutfilegettextgrub2-commongrub2-pc-modulesgrub2-toolsgrub2-tools-extragrub2-tools-minimalrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)which1:2.04-27.oe11:2.04-27.oe11:2.04-27.oe11:2.04-27.oe11:2.04-27.oe11:2.04-27.oe13.0.4-14.6.0-14.0-15.2-14.15.1c#@cwsc @bx@b1@b@a@aQ@a@``@`c`a@`a@`W5@`Q@`P`KW`:4@`3zhangqiumiao - 1:2.04-27zhangqiumiao - 1:2.04-26wanglu - 1:2.04-25chenjirong - 2.04-24xihaochen - 2.04-23zhangqiumiao - 2.04-22fengtao - 2.04-21zhangqiumiao - 2.04-20gaihuiying - 2.04-19yanan - 2.04-18zhangqiumiao - 2.04-17zhangqiumiao - 2.04-16zhangqiumiao - 2.04-15renmingshuai - 2.04-14orange-snn - 2.04-13zhangqiumiao - 2.04-12hanhui - 2.04-11yanglu - 2.04-10fengtao - 2.04-9zhangqiumiao - 2.04-8- Type:bugfix - CVE:NA - SUG:NA - DESC:fs/minix: Avoid mistakenly probing ext2 filesystems- Type:CVE - CVE:CVE-2022-2601 CVE-2022-3775 - SUG:NA - DESC:fix CVE-2022-2601 and CVE-2022-3775- Type:bugfix - CVE:NA - SUG:NA - DESC:tests: Disable blkid cache usage disk/efi/efidisk: Pass buffers with higher alignment- Type:CVE - CVE:CVE-2021-3697 CVE-2022-28735 CVE-2022-28736 CVE-2022-28734 CVE-2022-28733 CVE-2021-3695 CVE-2021-3696 - SUG:NA - DESC:fix CVE-2021-3697 CVE-2022-28735 CVE-2022-28736 CVE-2022-28734 CVE-2022-28733 CVE-2021-3695 CVE-2021-3696- Type:CVE - CVE:CVE-2021-3981 - SUG:NA - DESC:Fix CVE-2021-3981- Type:bugfix - CVE:NA - SUG:NA - DESC:disable grub-boot-success.service- Type:bugfix - ID:NA - SUG:NA - DESC:Fix bad test on GRUB_DISABLE_SUBMENU- Type:bugfix - ID:NA - SUG:NA - DESC:verifiers: Fix calling uninitialized function pointer- Type:bugfix - ID:NA - SUG:NA - DESC:modify git config parameters- Type:bugfix - ID:NA - SUG:NA - DESC:delete the Symbolic Link of grubenv in grub2-efi-x64 and grub-efi-aa64 packages- Type:bugfix - ID:NA - SUG:NA - DESC:delete the Symbolic Link of grubenv in grub2-efi-x64 and grub-efi-aa64 packages- Type:bugfix - ID:NA - SUG:NA - DESC:backport some patches from upstream community and fix incorrect author names in patches- Type:bugfix - ID:NA - SUG:NA - DESC:backport the patches that upstream community released on March 2, 2021- Type:bugfix - ID:NA - SUG:NA - DESC:add efi_vendor for vendor- fix postun error in grub2-efi-x64- Type:bugfix - ID:NA - SUG:NA - DESC:fix the installation failure of grub2-efi-x64/grub-efi-aa64 packages on the /boot partition of VFAT file system.- Type:cves - Id:CVE-2020-27779 CVE-2020-14372 - SUG:NA - DESC:fix CVE-2020-27779 CVE-2020-14372- Type:cves - Id:CVE-2020-25632 CVE-2020-25647 CVE-2020-27749 CVE-2021-20225 CVE-2021-20233 - SUG:NA - DESC:fix CVE-2020-25632 CVE-2020-25647 CVE-2020-27749 CVE-2021-20225 CVE-2021-20233- Type:bugfix - ID:NA - SUG:NA - DESC:tftp roll over block counter to prevent timeouts with data packets- Type:bugfix - ID:NA - SUG:NA - DESC:fix kernel not found because grub.cfg using BLS formatgrub2obs-worker-backend-test-x86-0009 16710565421:2.04-27.oe11:2.04-27.oe11:2.04-27.oe11:2.04-27.oe11:2.04-27.oe1grub.cfgentriesgrub2.cfg/boot/grub2//boot/loader//etc/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/95dd260e75acbacd338e792353c0f681-grub2cpioxz2x86_64-openEuler-linux-gnuemptydirectory_V.Putf-8f3ab3e972cfd55a58604c50ca8183d59ce721b8de485806373dbf7f1795656e3?7zXZ !#,y] b2 1٘A,!7#4^s|ۼpG>7~[6Oc*)c~u,Q{U)>)#}7fEzr&Ym}~>`(! 0?I[s &E?$CLy-'PsO! YZ