vim-filesystem-2:8.2-40.oe2203 >  A bW^^fU "p ? +̀CHz 6.h'_gZ-U.WzxQ ǽ LK']obva( ӻqbѓbe[P$9@lN46- X锕s?4CVdjۯIR#@{ Q۾cK; VKpFQO1ڑr׫V205YNh]n:#]i\R_MML9k^]9b424a7e250f9a2aadf91d583723564bbe8a70df371b139defa8e1b96330f29c4452882b9d88d714b48dc3b0f5f39dc88156e6ae%bW^^f~RKZy GOO! 9p_@^*>qKshV?Ӝ;)XziĹxUkqݑ~ )ΰĕi(4pK-?YIv >c;x}' u +?2=FF;wn!m"cTApLNZ ]6bv)!k+Zk1DٕY;*,`ªqehYS.kle'̬ZO+X$,~S_.|>p>?d  $ 8dh t   \ y  .H?([8d'9': <'FG HIXY\(]^ebcdeflt8uv z0@DJCvim-filesystem8.240.oe2203The vim filesystem.This package contains the vim filesystem.b!obs-worker1639015616-x86-0009Huawei openEulerhttp://openeuler.orgVim and MIThttp://openeuler.orgUnspecifiedhttp://www.vim.orglinuxnoarchAAAAAAAAAAAAAAAAAA큤AAAAAAAAAAb!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!b!@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootvim-8.2-40.oe2203.src.rpmvim-filesystem    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.17.0bbx@bx@bbb@b@b - 2:8.2-40renhongxun - 2:8.2-39tianwei - 2:8.2-38renhongxun - 2:8.2-37shixuantong - 2:8.2-36shixuantong - 2:8.2-35shixuantong - 2:8.2-34shixuantong - 2:8.2-33shangyibin - 2:8.2-32wangjiang - 2:8.2-31wangjiang - 2:8.2-30yuanxin - 2:8.2-29yuanxin - 2:8.2-28yuanxin - 2:8.2-27shixuantong - 2:8.2-26yuanxin - 2:8.2-25huangduirong - 2:8.2-24tianwei - 2:8.2-23shixuantong - 2:8.2-22yuanxin - 2:8.2-21guozhaorui - 2:8.2-20yuanxin - 2:8.2-19shixuantong - 2:8.2-18shixuantong - 2:8.2-17shixuantong - 2:8.2-16ExtinctFire - 2:8.2-15shixuantong - 2:8.2-14shixuantong - 2:8.2-13shixuantong - 2:8.2-12shixuantong - 2:8.2-11shixuantong - 2:8.2-10shixuantong - 2:8.2-9shixuantong - 2:8.2-8shixuantong - 2:8.2-7wangjie -2:8.2-6Jie Yang - 2:8.2-5shixuantong - 2:8.2-4wenzhanli - 2:8.2-3chengquan -2:8.2-2- Type:CVE - ID:CVE-2022-1886 - SUG:NA - DESC:fix CVE-2022-1886- Type:CVE - ID:CVE-2022-1927 - SUG:NA - DESC:fix CVE-2022-1927- Type:CVE - ID:CVE-2022-1851 - SUG:NA - DESC:fix CVE-2022-1851- Type:CVE - ID:CVE-2022-1785 - SUG:NA - DESC:fix CVE-2022-1785- Type:CVE - ID:CVE-2022-1796 - SUG:NA - DESC:fix CVE-2022-1796- Type:CVE - ID:CVE-2022-1733 CVE-2022-1735 - SUG:NA - DESC:fix CVE-2022-1733 CVE-2022-1735- Type:CVE - ID:CVE-2022-1629 CVE-2022-1620 CVE-2022-1674 CVE-2022-1621 CVE-2022-1619 - SUG:NA - DESC:fix CVE-2022-1629 CVE-2022-1620 CVE-2022-1674 CVE-2022-1621 CVE-2022-1619- Type:CVE - ID:CVE-2022-1154 - SUG:NA - DESC:fix CVE-2022-1154- Type:CVE - ID:CVE-2022-1616 - SUG:NA - DESC:fix CVE-2022-1616- Type:CVE - ID:CVE-2022-0629 - SUG:NA - DESC:fix CVE-2022-0629- Type:CVE - ID:CVE-2021-4069 - SUG:NA - DESC:fix CVE-2021-4069- Type:CVE - ID:CVE-2022-0943 - SUG:NA - DESC:fix CVE-2022-0943- Type:CVE - ID:CVE-2022-0319 CVE-2022-0554 - SUG:NA - DESC:fix CVE-2022-0319 CVE-2022-0554- Type:bugfix - ID:NA - SUG:NA - DESC:cve patch test cases are rectified- Type:CVE - ID:CVE-2022-0685 - SUG:NA - DESC:fix CVE-2022-0685- Type:CVE - ID:CVE-2022-0714 CVE-2022-0729 - SUG:NA - DESC:fix CVE-2022-0714 CVE-2022-0729- Type:CVE - ID:CVE-2022-0572 - SUG:NA - DESC:fix CVE-2022-0572- Type:CVE - ID:CVE-2022-0443 CVE-2022-0392 CVE-2022-0417 - SUG:NA - DESC:fix CVE-2022-0443 CVE-2022-0392 CVE-2022-0417- Type:CVE - ID:CVE-2022-0351 CVE-2022-0361 CVE-2022-0408 CVE-2022-0359 CVE-2022-0368 CVE-2022-0413 - SUG:NA - DESC:fix CVE-2022-0351 CVE-2022-0361 CVE-2022-0408 CVE-2022-0359 CVE-2022-0368 CVE-2022-0413- Type:bugfix - ID:NA - SUG:NA - DESC:fix garbled characters display when file name matches- Type:CVE - ID:CVE-2022-0213 CVE-2022-0261 CVE-2022-0318 - SUG:NA - DESC:CVE-2022-0213 CVE-2022-0261 CVE-2022-0318- Type:CVE - ID:CVE-2021-4166 CVE-2021-4192 CVE-2021-4193 - SUG:NA - DESC:fix CVE-2021-4166 CVE-2021-4192 CVE-2021-4193- Type:bugfix - ID:NA - SUG:NA - DESC:fix build fail- Type:CVE - ID:CVE-2021-4019 - SUG:NA - DESC:fix CVE-2021-4019- Type:CVE - ID:CVE-2021-3984 - SUG:NA - DESC:fix CVE-2021-3984- Type:CVE - ID:CVE-2021-3973 CVE-2021-3974 - SUG:NA - DESC:fix CVE-2021-3973 CVE-2021-3974- Type:CVE - ID:CVE-2021-3927 CVE-2021-3927 - SUG:NA - DESC:fix CVE-2021-3927 CVE-2021-3928- Type:CVE - ID:CVE-2021-3903 - SUG:NA - DESC:fix CVE-2021-3903- Type:CVE - ID:CVE-2021-3872 CVE-2021-3875 - SUG:NA - DESC:fix CVE-2021-3872 CVE-2021-3875- Type:CVE - ID:CVE-2021-3778 CVE-2021-3796 - SUG:NA - DESC:fix CVE-2021-3778 CVE-2021-3796- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2021-3770- Type:bugfix - ID:NA - SUG:NA - DESC:fix signal stack size is wrong with latest glibc 2.34- Type:bugfix - ID:NA - SUG:NA - DESC:fix configure does not recognize gcc 10.0 and later- Type:bugfix - ID:NA - SUG:NA - DESC:add gcc to BuildRequires- Type:NA - ID:NA - SUG:NA - DESC:remove python2- Type:bugfix - ID:NA - SUG:NA - DESC:Fix wrong path passed to --with-python3-config-dir.- Type:bugfix - ID:NA - SUG:NA - DESC:Fix build failuers with perl 5.32- Type:bugfix - ID:NA - SUG:NA - DESC:Fix make test because lua update version 5.4.0- Type:bugfix - ID:NA - SUG:NA - DESC:Fix compilation errors caused by python upgradeobs-worker1639015616-x86-0009 1655251200 2:8.2-40.oe2203autoloadcolorscompilerdocftdetectftpluginindentkeymaplangpluginprintspellsyntaxtutorautoloadcolorscompilerdoctagsftdetectftpluginindentkeymaplangpluginprintspellsyntaxtutor/usr/share/vim/vimfiles/after//usr/share/vim/vimfiles//usr/share/vim/vimfiles/doc/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:22.03:LTS/standard_x86_64/5d541c32302d7de2728738f8481324a0-vimcpioxz2x86_64-openEuler-linux-gnudirectoryemptyƋ!c+Nutf-8c4862daba5a5b39c05c892c6b7b0eb5280446f6558f8a495f2d36c26ea3e58e56d09aa0f09c821905fbfca298e68b0796c4fe7481df25f76d500a8a13b79e859? 7zXZ !#,{X] b2u jӫ`(y-P pz3N{3w%P|sS|-8JxHv|nZ3XVUSFB@uV"M#z! ѸvP #V1Y"ː?QZM3hܥ3"K@C#:=0|$);A0j_.E2'9" ĎDw.^:_%s:OK!Ԍ-m  !_)hylOH_v;yY Qz YZ