vim-filesystem-2:9.0-7.oe2203 >  A cW^^f)%bqƒZx2\D:dᜡ'wEgZ%QߴԅmÙ8eYB}DK51+M }u\ L }$̓y* KCdAYzXC[n࢒< A;"}lL~1/Om^__i(*;5:&1Zofa7%!٫ZH,L]q1є +)T`Lf+$:6 bԕ*baa8465d9d871bae6b59e7e722f0d04d380bfa25ea2d6c47bf72c9862c3f5e9386343f02d3623d343134ac513d755e4b655ecbb37cW^^ft12N,}o{Z`OE太kVz=>8Y9>8=fĩ૶9a!Ldcݸo;& #I ҈@#bJd eI9$:v^J3<|&!}QK${nnef{' gڌIH%iVf4Ss0Mz/ȧiͥi~II%l0 !˿O-fњ B 0unUW|>p>1?1d  $ 8dh x   ` } 2LC(_8hI9I:tIF+G,$H,I- X-,Y-0\-@]-^.}b.c/d0)e0.f01l03t0Pu0v18z1H1X1\1b11Cvim-filesystem9.07.oe2203The vim filesystem.This package contains the vim filesystem.cYobs-worker-backend-test-x86-0007Huawei openEulerhttp://openeuler.orgVim and MIThttp://openeuler.orgUnspecifiedhttp://www.vim.orglinuxnoarchAAAAAAAAAAAAAAAAAA큤AAAAAAAAAAcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcYcY@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootvim-9.0-7.oe2203.src.rpmvim-filesystem    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.17.0cccc.cEc@clc_cMCcIO@cEZcD @c-c)@c pc@cAc @c @cob{@bbb@bڑ@b@bVbγbγbb@b'b'b>b@bUbb@bbbx@bx@bbb@b@b - 2:9.0-7wangjiang - 2:9.0-6wangjiang - 2:9.0-5wangjiang - 2:9.0-4wuzx - 2:9.0-3wangjiang - 2:9.0-2wangjiang - 2:9.0-1wangjiang - 2:8.2-72dongyuzhen - 2:8.2-71wangjiang - 2:8.2-70renhongxun - 2:8.2-69dongyuzhen - 2:8.2-68dongyuzhen - 2:8.2-67dongyuzhen - 2:8.2-66wangjiang - 2:8.2-65renhongxun - 2:8.2-64shixuantong - 2:8.2-63shixuantong - 2:8.2-62licihua - 2:8.2-61shixuantong - 2:8.2-60shixuantong - 2:8.2-59dongyuzhen - 2:8.2-58shixuantong - 2:8.2-57shixuantong - 2:8.2-56dongyuzhen - 2:8.2-55shixuantong - 2:8.2-54shangyibin - 2:8.2-53yanglongkang - 2:8.2-52shixuantong - 2:8.2-51shixuantong - 2:8.2-50tianwei - 2:8.2-49renhongxun - 2:8.2-48shixuantong - 2:8.2-47shixuantong - 2:8.2-46renhongxun - 2:8.2-45liukuo - 2:8.2-44dongyuzhen - 2:8.2-43shixuantong - 2:8.2-42tianwei - 2:8.2-41renhongxun - 2:8.2-40renhongxun - 2:8.2-39tianwei - 2:8.2-38renhongxun - 2:8.2-37shixuantong - 2:8.2-36shixuantong - 2:8.2-35shixuantong - 2:8.2-34shixuantong - 2:8.2-33shangyibin - 2:8.2-32wangjiang - 2:8.2-31wangjiang - 2:8.2-30yuanxin - 2:8.2-29yuanxin - 2:8.2-28yuanxin - 2:8.2-27shixuantong - 2:8.2-26yuanxin - 2:8.2-25huangduirong - 2:8.2-24tianwei - 2:8.2-23shixuantong - 2:8.2-22yuanxin - 2:8.2-21guozhaorui - 2:8.2-20yuanxin - 2:8.2-19shixuantong - 2:8.2-18shixuantong - 2:8.2-17shixuantong - 2:8.2-16ExtinctFire - 2:8.2-15shixuantong - 2:8.2-14shixuantong - 2:8.2-13shixuantong - 2:8.2-12shixuantong - 2:8.2-11shixuantong - 2:8.2-10shixuantong - 2:8.2-9shixuantong - 2:8.2-8shixuantong - 2:8.2-7- Type:CVE - ID:CVE-2023-0049 CVE-2023-0051 CVE-2023-0054 - SUG:NA - DESC:CVE-2023-0049 CVE-2023-0051 CVE-2023-0054- Type:bugfix - ID:NA - SUG:NA - DESC:remove rpath and runpath of exec files and libraries- Type:CVE - ID:CVE-2022-4292 CVE-2022-4293 - SUG:NA - DESC:fix CVE-2022-4292 CVE-2022-4293- Type:CVE - ID:CVE-2022-3491 CVE-2022-3520 CVE-2022-3591 - SUG:NA - DESC:fix CVE-2022-3491 CVE-2022-3520 CVE-2022-3591- Type:feature - CVE:NA - SUG:NA - DESC:Add sw64 architecture- Type:CVE - ID:CVE-2022-4141 - SUG:NA - DESC:fix CVE-2022-4141- Type:enhancement - ID:NA - SUG:NA - DESC:upgrade version to 9.0- Type:CVE - ID:CVE-2022-3705 - SUG:NA - DESC:fix CVE-2022-3705- Type:CVE - ID:CVE-2022-3324 - SUG:NA - DESC:fix CVE-2022-3324- Type:CVE - ID:CVE-2022-3297 - SUG:NA - DESC:fix CVE-2022-3297- Type:CVE - ID:CVE-2022-3296 - SUG:NA - DESC:fix CVE-2022-3296- Type:CVE - ID:CVE-2022-3352 - SUG:NA - DESC:fix CVE-2022-3352- Type:CVE - ID:CVE-2022-3256 - SUG:NA - DESC:fix CVE-2022-3256- Type:CVE - ID:CVE-2022-3234 CVE-2022-3235 - SUG:NA - DESC:fix CVE-2022-3234 CVE-2022-3235- Type:CVE - ID:CVE-2022-3134 - SUG:NA - DESC:fix CVE-2022-3134- Type:CVE - ID:CVE-2022-3099 - SUG:NA - DESC:fix CVE-2022-3099- Type:bugfix - ID:NA - SUG:NA - DESC:enable check- Type:CVE - ID:CVE-2022-3016 - SUG:NA - DESC:fix CVE-2022-3016- Type:CVE - ID:CVE-2022-2980 - SUG:NA - DESC:fix CVE-2022-2980- Type:CVE - ID:CVE-2022-2923 CVE-2022-2946 - SUG:NA - DESC:fix CVE-2022-2923 CVE-2022-2946- Type:CVE - ID:CVE-2022-2845 - SUG:NA - DESC:fix CVE-2022-2845- Type:CVE - ID:CVE-2022-1725 - SUG:NA - DESC:fix CVE-2022-1725- Type:CVE - ID:CVE-2022-2598 CVE-2022-2571 - SUG:NA - DESC:fix CVE-2022-2598 CVE-2022-2571- Type:CVE - ID:CVE-2022-2522 - SUG:NA - DESC:fix CVE-2022-2522- Type:bugfix - ID:NA - SUG:NA - DESC:fix the error of backport-cannot-list-options-one-per-line.patch- Type:CVE - ID:CVE-2022-2343 - SUG:NA - DESC:fix CVE-2022-2343- Type:CVE - ID:CVE-2022-2289 - SUG:NA - DESC:fix CVE-2022-2289- Type:CVE - ID:CVE-2022-2210 - SUG:NA - DESC:fix CVE-2022-2210- Type:CVE - ID:CVE-2022-2264 CVE-2022-2257 CVE-2022-2286 CVE-2022-2287 - SUG:NA - DESC:fix CVE-2022-2264 CVE-2022-2257 CVE-2022-2286 CVE-2022-2287- Type:CVE - ID:CVE-2022-2000 CVE-2022-2042 CVE-2022-2284 CVE-2022-2285 CVE-2022-2304 CVE-2022-2344 CVE-2022-2345 - SUG:NA - DESC:fix CVE-2022-2000 CVE-2022-2042 CVE-2022-2284 CVE-2022-2285 CVE-2022-2304 CVE-2022-2344 CVE-2022-2345- Type:CVE - ID:CVE-2022-2207 CVE-2022-2208 - SUG:NA - DESC:fix CVE-2022-2207 CVE-2022-2208- Type:CVE - ID:CVE-2022-1720,CVE-2022-2183 - SUG:NA - DESC:fix CVE-2022-1720,CVE-2022-2183- Type:CVE - ID:CVE-2022-2125,CVE-2022-2206 - SUG:NA - DESC:fix CVE-2022-2125,CVE-2022-2206- Type:CVE - ID:CVE-2022-2126 - SUG:NA - DESC:fix CVE-2022-2126- Type:CVE - ID:CVE-2022-2175 - SUG:NA - DESC:fix CVE-2022-2175- Type:CVE - ID:CVE-2022-2124 - SUG:NA - DESC:fix CVE-2022-2124- Type:CVE - ID:CVE-2022-1771 - SUG:NA - DESC:fix CVE-2022-1771- Type:CVE - ID:CVE-2022-1897 CVE-2022-1968 - SUG:NA - DESC:fix CVE-2022-1897 CVE-2022-1968- Type:CVE - ID:CVE-2022-1898 CVE-2022-1942 - SUG:NA - DESC:fix CVE-2022-1898 CVE-2022-1942- Type:CVE - ID:CVE-2022-1886 - SUG:NA - DESC:fix CVE-2022-1886- Type:CVE - ID:CVE-2022-1927 - SUG:NA - DESC:fix CVE-2022-1927- Type:CVE - ID:CVE-2022-1851 - SUG:NA - DESC:fix CVE-2022-1851- Type:CVE - ID:CVE-2022-1785 - SUG:NA - DESC:fix CVE-2022-1785- Type:CVE - ID:CVE-2022-1796 - SUG:NA - DESC:fix CVE-2022-1796- Type:CVE - ID:CVE-2022-1733 CVE-2022-1735 - SUG:NA - DESC:fix CVE-2022-1733 CVE-2022-1735- Type:CVE - ID:CVE-2022-1629 CVE-2022-1620 CVE-2022-1674 CVE-2022-1621 CVE-2022-1619 - SUG:NA - DESC:fix CVE-2022-1629 CVE-2022-1620 CVE-2022-1674 CVE-2022-1621 CVE-2022-1619- Type:CVE - ID:CVE-2022-1154 - SUG:NA - DESC:fix CVE-2022-1154- Type:CVE - ID:CVE-2022-1616 - SUG:NA - DESC:fix CVE-2022-1616- Type:CVE - ID:CVE-2022-0629 - SUG:NA - DESC:fix CVE-2022-0629- Type:CVE - ID:CVE-2021-4069 - SUG:NA - DESC:fix CVE-2021-4069- Type:CVE - ID:CVE-2022-0943 - SUG:NA - DESC:fix CVE-2022-0943- Type:CVE - ID:CVE-2022-0319 CVE-2022-0554 - SUG:NA - DESC:fix CVE-2022-0319 CVE-2022-0554- Type:bugfix - ID:NA - SUG:NA - DESC:cve patch test cases are rectified- Type:CVE - ID:CVE-2022-0685 - SUG:NA - DESC:fix CVE-2022-0685- Type:CVE - ID:CVE-2022-0714 CVE-2022-0729 - SUG:NA - DESC:fix CVE-2022-0714 CVE-2022-0729- Type:CVE - ID:CVE-2022-0572 - SUG:NA - DESC:fix CVE-2022-0572- Type:CVE - ID:CVE-2022-0443 CVE-2022-0392 CVE-2022-0417 - SUG:NA - DESC:fix CVE-2022-0443 CVE-2022-0392 CVE-2022-0417- Type:CVE - ID:CVE-2022-0351 CVE-2022-0361 CVE-2022-0408 CVE-2022-0359 CVE-2022-0368 CVE-2022-0413 - SUG:NA - DESC:fix CVE-2022-0351 CVE-2022-0361 CVE-2022-0408 CVE-2022-0359 CVE-2022-0368 CVE-2022-0413- Type:bugfix - ID:NA - SUG:NA - DESC:fix garbled characters display when file name matches- Type:CVE - ID:CVE-2022-0213 CVE-2022-0261 CVE-2022-0318 - SUG:NA - DESC:CVE-2022-0213 CVE-2022-0261 CVE-2022-0318- Type:CVE - ID:CVE-2021-4166 CVE-2021-4192 CVE-2021-4193 - SUG:NA - DESC:fix CVE-2021-4166 CVE-2021-4192 CVE-2021-4193- Type:bugfix - ID:NA - SUG:NA - DESC:fix build fail- Type:CVE - ID:CVE-2021-4019 - SUG:NA - DESC:fix CVE-2021-4019- Type:CVE - ID:CVE-2021-3984 - SUG:NA - DESC:fix CVE-2021-3984- Type:CVE - ID:CVE-2021-3973 CVE-2021-3974 - SUG:NA - DESC:fix CVE-2021-3973 CVE-2021-3974- Type:CVE - ID:CVE-2021-3927 CVE-2021-3927 - SUG:NA - DESC:fix CVE-2021-3927 CVE-2021-3928- Type:CVE - ID:CVE-2021-3903 - SUG:NA - DESC:fix CVE-2021-3903- Type:CVE - ID:CVE-2021-3872 CVE-2021-3875 - SUG:NA - DESC:fix CVE-2021-3872 CVE-2021-3875- Type:CVE - ID:CVE-2021-3778 CVE-2021-3796 - SUG:NA - DESC:fix CVE-2021-3778 CVE-2021-3796- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2021-3770- Type:bugfix - ID:NA - SUG:NA - DESC:fix signal stack size is wrong with latest glibc 2.34- Type:bugfix - ID:NA - SUG:NA - DESC:fix configure does not recognize gcc 10.0 and later- Type:bugfix - ID:NA - SUG:NA - DESC:add gcc to BuildRequiresobs-worker-backend-test-x86-0007 1673222400 2:9.0-7.oe2203autoloadcolorscompilerdocftdetectftpluginindentkeymaplangpluginprintspellsyntaxtutorautoloadcolorscompilerdoctagsftdetectftpluginindentkeymaplangpluginprintspellsyntaxtutor/usr/share/vim/vimfiles/after//usr/share/vim/vimfiles//usr/share/vim/vimfiles/doc/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:22.03:LTS/standard_x86_64/98b2f09f9308137c7ec92f9b495773b6-vimcpioxz2x86_64-openEuler-linux-gnudirectoryempty.2.5Dutf-8f5f59c9424163fa53a8fe4fb8ed2e2439cd281fd785f32a704ecd767bb99288a7a52529201684314f70a3a4eef9ab6a031d5888118270f9788bb9fb16e80e6a7? 7zXZ !#,{W] b2u jӫ`(y.a\=`Y]mSؠV JA`Sf{dRkisS.dH)Ԅ|d: j-ȍi+{0|`KAqb3UL9A_w 3ޣb7u-ǁ/JfNn*c f#6C(x2+7W儾˓~D16yLEkE eIE5Wɰuד7'kD!N)k}܇0p¦pfXwLάLѸl.,2@Q]NmA+chث YzRRhC :N1Ո'n  YZ