vim-minimal-2:9.0-10.oe1 >
A d?W^^fia yAَfhN]iqu8|,"ipsX«,%5kQ߅yĐhCy*H& uyh(
4QΎXvTxe/9خ"Nx#oxxv t1ӭ19a0853ee15be414c61acfbe1b1a5cda9a476dd0 9a35b0aa5ee29ca57772f57c53f5b27f891d957c9f2475cd4ef83e9bdb9f0999
6̉ d?W^^f* i6ACP j?҈cf&vQ7
p:azrԁ]i=g
1|ɪ|(FWz@1"dx `9|&
әkH"ZORЗiCk2;&[䃤|3lxk3>a%)nS^!sY>lrY|wcYw"Q2F@ VlĝyEcʰ,ϖ_(2 kٵr T > p C 3 ? 3 d k . C O d p
,
y
%
f
D 0 h l w ( 8 H 9 H : _ H F - G -
H .(
I .\
X .l Y . \ .
] .
^ /G b / c 0 d 0 e 0 f 0 l 0 t 1
u 1L
v 1 w 2
x 2
y 3 z 3T 3d 3h 3n 3 C vim-minimal 9.0 10.oe1 This package provides the basic and minimal functionalities of vim editor. The minimal package provides a minimal version of vim editor. It will be installed as /usr/bin/vi. d?obs-worker-backend-test-x86-0009.novalocal openEuler:20.03:LTS:SP3 / standard_x86_64 http://openeuler.org Vim and MIT http://openeuler.org Unspecified http://www.vim.org linux x86_64 _ s " 䁤 a+d?_d?_d?_d?`d?_d?bd?bd?bd?_d?bd?`d?^c984508e3ba6eaf747dd4318ccf45171d434edfa1f1e392ef9d4a0676c1116ea bf59801dd0064cdc49c8bb1169dd07a022b5c5f01486946d5a6a1e6016cbef2a f0d2f40e364e7faead5d4af1a7cb188506c014d640500035ec6213dbde992156 6da1daa476477bb480777da09c338b334348510cbb42345a91d8f8b2bcf9daa4 c2ad5252a62ce56b0ffc57480a75cbf5775ab8dcf218c1c1082636ef2bb7e58a vi vi vi vi vim.1.gz vi.1.gz vim.1.gz vim.1.gz root root root root root root root root root root root root root root root root root root root root root root root root root root vim-9.0-10.oe1.src.rpm /usr/bin/vi config(vim-minimal) vi vim-minimal vim-minimal(x86-64) @ @ @ @ @ @ @ @ @ @ @ @ @
@ config(vim-minimal) libacl.so.1()(64bit) libacl.so.1(ACL_1.0)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.14)(64bit) libc.so.6(GLIBC_2.15)(64bit) libc.so.6(GLIBC_2.2.5)(64bit) libc.so.6(GLIBC_2.28)(64bit) libc.so.6(GLIBC_2.3)(64bit) libc.so.6(GLIBC_2.3.4)(64bit) libc.so.6(GLIBC_2.4)(64bit) libselinux.so.1()(64bit) libselinux.so.1(LIBSELINUX_1.0)(64bit) libtinfo.so.6()(64bit) rpmlib(CompressedFileNames) rpmlib(FileDigests) rpmlib(PayloadFilesHavePrefix) rpmlib(PayloadIsXz) rtld(GNU_HASH) 2:9.0-10.oe1 3.0.4-1 4.6.0-1 4.0-1 5.2-1 vim-common 8.0.1428-4 4.15.1 dxccc_cccc.c@clc_cMCcIO@cEZcAf@c-c)@c!@c@c@c
@cob)bbb@bڑ@b@bVbγbγbbb'b'b>b@bUbb@bbb&bbb@b@b - 2:9.0-10 wangjiang - 2:9.0-9 wangjiang - 2:9.0-8 wangjiang - 2:9.0-7 wangjiang - 2:9.0-6 wangjiang - 2:9.0-5 wangjiang - 2:9.0-4 wangjiang - 2:9.0-3 wangjiang - 2:9.0-2 wangjiang - 2:9.0-1 wangjiang - 2:8.2-63 dongyuzhen - 2:8.2-62 wangjiang - 2:8.2-61 renhongxun - 2:8.2-60 dongyuzhen - 2:8.2-59 dongyuzhen - 2:8.2-58 dongyuzhen - 2:8.2-57 wangjiang - 2:8.2-56 renhongxun - 2:8.2-55 shixuantong - 2:8.2-54 shixuantong - 2:8.2-53 shixuantong - 2:8.2-52 shixuantong - 2:8.2-51 dongyuzhen - 2:8.2-50 shixuantong - 2:8.2-49 BruceGW - 2:8.2-48 dongyuzhen - 2:8.2-47 shixuantong - 2:8.2-46 shangyibin - 2:8.2-45 yanglongkang - 2:8.2-44 shixuantong - 2:8.2-43 shixuantong - 2:8.2-42 tianwei - 2:8.2-41 renhongxun - 2:8.2-40 shixuantong - 2:8.2-39 shixuantong - 2:8.2-38 renhongxun - 2:8.2-37 liukuo - 2:8.2-36 dongyuzhen - 2:8.2-35 shixuantong - 2:8.2-34 tianwei - 2:8.2-33 renhongxun - 2:8.2-32 renhongxun - 2:8.2-31 renhongxun - 2:8.2-30 shixuantong - 2:8.2-29 shixuantong - 2:8.2-28 shixuantong - 2:8.2-27 shixuantong - 2:8.2-26 shangyibin - 2:8.2-25 yuanxin - 2:8.2-24 yuanxin - 2:8.2-23 shixuantong - 2:8.2-22 yuanxin - 2:8.2-21 yuanxin - 2:8.2-20 yuanxin - 2:8.2-19 yuanxin - 2:8.2-18 yuanxin - 2:8.2-17 tianwei - 2:8.2-16 shixuantong - 2:8.2-15 yuanxin - 2:8.2-14 guozhaorui - 2:8.2-13 guozhaorui - 2:8.2-12 yuanxin - 2:8.2-11 yuanxin - 2:8.2-10 shixuantong - 2:8.2-9 shixuantong - 2:8.2-8 shixuantong - 2:8.2-7 shixuantong - 2:8.2-6 shixuantong - 2:8.2-5 shixuantong - 2:8.2-4 shixuantong - 2:8.2-3 shixuantong - 2:8.2-2 - Type:CVE
- ID:CVE-2023-1170 CVE-2023-1175
- SUG:NA
- DESC:CVE-2023-1170 CVE-2023-1175 - Type:bugfix
- ID:NA
- SUG:NA
- DESC:backport upstream patch to fix memory leak - Type:CVE
- ID:CVE-2023-0433
- SUG:NA
- DESC:CVE-2023-0433 - Type:CVE
- ID:CVE-2022-47024 CVE-2023-0288
- SUG:NA
- DESC:CVE-2022-47024 CVE-2023-0288 - Type:CVE
- ID:CVE-2023-0049 CVE-2023-0051 CVE-2023-0054
- SUG:NA
- DESC:CVE-2023-0049 CVE-2023-0051 CVE-2023-0054 - Type:bugfix
- ID:NA
- SUG:NA
- DESC:remove rpath and runpath of exec files and libraries - Type:CVE
- ID:CVE-2022-4292 CVE-2022-4293
- SUG:NA
- DESC:fix CVE-2022-4292 CVE-2022-4293 - Type:CVE
- ID:CVE-2022-3491 CVE-2022-3520 CVE-2022-3591
- SUG:NA
- DESC:fix CVE-2022-3491 CVE-2022-3520 CVE-2022-3591 - Type:CVE
- ID:CVE-2022-4141
- SUG:NA
- DESC:fix CVE-2022-4141 - Type:enhancement
- ID:NA
- SUG:NA
- DESC:upgrade version to 9.0 - Type:CVE
- ID:CVE-2022-3705
- SUG:NA
- DESC:fix CVE-2022-3705 - Type:CVE
- ID:CVE-2022-3324
- SUG:NA
- DESC:fix CVE-2022-3324 - Type:CVE
- ID:CVE-2022-3297
- SUG:NA
- DESC:fix CVE-2022-3297 - Type:CVE
- ID:CVE-2022-3296
- SUG:NA
- DESC:fix CVE-2022-3296 - Type:CVE
- ID:CVE-2022-3352
- SUG:NA
- DESC:fix CVE-2022-3352 - Type:CVE
- ID:CVE-2022-3256
- SUG:NA
- DESC:fix CVE-2022-3256 - Type:CVE
- ID:CVE-2022-3234 CVE-2022-3235
- SUG:NA
- DESC:fix CVE-2022-3234 CVE-2022-3235 - Type:CVE
- ID:CVE-2022-3134
- SUG:NA
- DESC:fix CVE-2022-3134 - Type:CVE
- ID:CVE-2022-3099
- SUG:NA
- DESC:fix CVE-2022-3099 - Type:CVE
- ID:CVE-2022-3016
- SUG:NA
- DESC:fix CVE-2022-3016 - Type:CVE
- ID:CVE-2022-2980
- SUG:NA
- DESC:fix CVE-2022-2980 - Type:CVE
- ID:CVE-2022-2923 CVE-2022-2946
- SUG:NA
- DESC:fix CVE-2022-2923 CVE-2022-2946 - Type:CVE
- ID:CVE-2022-2845
- SUG:NA
- DESC:fix CVE-2022-2845 - Type:CVE
- ID:CVE-2022-1725
- SUG:NA
- DESC:fix CVE-2022-1725 - Type:CVE
- ID:CVE-2022-2598 CVE-2022-2571
- SUG:NA
- DESC:fix CVE-2022-2598 CVE-2022-2571 - Type:CVE
- ID:CVE-2022-2522
- SUG:NA
- DESC:fix CVE-2022-2522 - Type:bugfix
- ID:NA
- SUG:NA
- DESC:fix the error of backport-cannot-list-options-one-per-line.patch - Type:CVE
- ID:CVE-2022-2343
- SUG:NA
- DESC:fix CVE-2022-2343 - Type:CVE
- ID:CVE-2022-2289
- SUG:NA
- DESC:fix CVE-2022-2289 - Type:CVE
- ID:CVE-2022-2210
- SUG:NA
- DESC:fix CVE-2022-2210 - Type:CVE
- ID:CVE-2022-2264 CVE-2022-2257 CVE-2022-2286 CVE-2022-2287
- SUG:NA
- DESC:fix CVE-2022-2264 CVE-2022-2257 CVE-2022-2286 CVE-2022-2287 - Type:CVE
- ID:CVE-2022-2000 CVE-2022-2042 CVE-2022-2284 CVE-2022-2285 CVE-2022-2304 CVE-2022-2344 CVE-2022-2345
- SUG:NA
- DESC:fix CVE-2022-2000 CVE-2022-2042 CVE-2022-2284 CVE-2022-2285 CVE-2022-2304 CVE-2022-2344 CVE-2022-2345 - Type:CVE
- ID:CVE-2022-2207 CVE-2022-2208
- SUG:NA
- DESC:fix CVE-2022-2207 CVE-2022-2208 - Type:CVE
- ID:CVE-2022-1720,CVE-2022-2183
- SUG:NA
- DESC:fix CVE-2022-1720,CVE-2022-2183 - Type:CVE
- ID:CVE-2022-2125,CVE-2022-2206
- SUG:NA
- DESC:fix CVE-2022-2125,CVE-2022-2206 - Type:CVE
- ID:CVE-2022-2126
- SUG:NA
- DESC:fix CVE-2022-2126 - Type:CVE
- ID:CVE-2022-2175
- SUG:NA
- DESC:fix CVE-2022-2175 - Type:CVE
- ID:CVE-2022-2124
- SUG:NA
- DESC:fix CVE-2022-2124 - Type:CVE
- ID:CVE-2022-1771
- SUG:NA
- DESC:fix CVE-2022-1771 - Type:CVE
- ID:CVE-2022-1897 CVE-2022-1968
- SUG:NA
- DESC:fix CVE-2022-1897 CVE-2022-1968 - Type:CVE
- ID:CVE-2022-1851 CVE-2022-1898 CVE-2022-1942
- SUG:NA
- DESC:fix CVE-2022-1851 CVE-2022-1898 CVE-2022-1942 - Type:CVE
- ID:CVE-2022-1886
- SUG:NA
- DESC:fix CVE-2022-1886 - Type:CVE
- ID:CVE-2022-1927
- SUG:NA
- DESC:fix CVE-2022-1927 - Type:CVE
- ID:CVE-2022-1785
- SUG:NA
- DESC:fix CVE-2022-1785 - Type:CVE
- ID:CVE-2022-1796
- SUG:NA
- DESC:fix CVE-2022-1796 - Type:CVE
- ID:CVE-2022-1733 CVE-2022-1735
- SUG:NA
- DESC:fix CVE-2022-1733 CVE-2022-1735 - Type:CVE
- ID:CVE-2022-1629 CVE-2022-1620 CVE-2022-1674 CVE-2022-1621 CVE-2022-1619
- SUG:NA
- DESC:fix CVE-2022-1629 CVE-2022-1620 CVE-2022-1674 CVE-2022-1621 CVE-2022-1619 - Type:CVE
- ID:CVE-2022-1154
- SUG:NA
- DESC:fix CVE-2022-1154 - Type:CVE
- ID:CVE-2022-1616
- SUG:NA
- DESC:fix CVE-2022-1616 - Type:CVE
- ID:CVE-2022-0943
- SUG:NA
- DESC:fix CVE-2022-0943 - Type:bugfix
- ID:NA
- SUG:NA
- DESC:cve patch test cases are rectified - Type:CVE
- ID:CVE-2022-0685
- SUG:NA
- DESC:fix CVE-2022-0685 - Type:CVE
- ID:CVE-2022-0714CVE-2022-0729
- SUG:NA
- DESC:fix CVE-2022-0714 CVE-2022-0729 - Type:CVE
- ID:CVE-2022-0629
- SUG:NA
- DESC:fix CVE-2022-0629 - Type:CVE
- ID:CVE-2022-0572
- SUG:NA
- DESC:fix CVE-2022-0572 - Type:CVE
- ID:CVE-2022-0319 CVE-2022-0554
- SUG:NA
- DESC:fix CVE-2022-0319 CVE-2022-0554 - Type:bugfix
- ID:NA
- SUG:NA
- DESC:add make check - Type:CVE
- ID:CVE-2022-0443 CVE-2022-0392 CVE-2022-0417
- SUG:NA
- DESC:fix CVE-2022-0443 CVE-2022-0392 CVE-2022-0417 - Type:CVE
- ID:CVE-2022-0351 CVE-2022-0361 CVE-2022-0408 CVE-2022-0359 CVE-2022-0368 CVE-2022-0413
- SUG:NA
- DESC:fix CVE-2022-0351 CVE-2022-0361 CVE-2022-0408 CVE-2022-0359 CVE-2022-0368 CVE-2022-0413 - Type:bugfix
- ID:NA
- SUG:NA
- DESC:fix garbled character display when file name matches - Type:CVE
- ID:CVE-2022-0261 CVE-2022-0318
- SUG:NA
- DESC:fix CVE-2022-0261 CVE-2022-0318 - Type:CVE
- ID:CVE-2022-0213
- SUG:NA
- DESC:fix CVE-2022-0213 - Type:CVE
- ID:CVE-2021-4166 CVE-2021-4192 CVE-2021-4193
- SUG:NA
- DESC:fix CVE-2021-4166 CVE-2021-4192 CVE-2021-4193 - Type:CVE
- ID:CVE-2021-4069
- SUG:NA
- DESC:fix CVE-2021-4069 - Type:CVE
- ID:CVE-2021-4019
- SUG:NA
- DESC:fix CVE-2021-4019 - Type:CVE
- ID:CVE-2021-3984
- SUG:NA
- DESC:fix CVE-2021-3984 - Type:CVE
- ID:CVE-2021-3973 CVE-2021-3974
- SUG:NA
- DESC:fix CVE-2021-3973 CVE-2021-3974 - Type:CVE
- ID:CVE-2021-3927 CVE-2021-3927
- SUG:NA
- DESC:fix CVE-2021-3927 CVE-2021-3928 - Type:CVE
- ID:CVE-2021-3903
- SUG:NA
- DESC:fix CVE-2021-3903 - Type:CVE
- ID:CVE-2021-3872 CVE-2021-3875
- SUG:NA
- DESC:fix CVE-2021-3872 CVE-2021-3875 - Type:CVE
- ID:CVE-2021-3778 CVE-2021-3796
- SUG:NA
- DESC:fix CVE-2021-3778 CVE-2021-3796 - Type:CVE
- ID:NA
- SUG:NA
- DESC:fix CVE-2021-3770 obs-worker-backend-test-x86-0009.novalocal 1678851846
2:9.0-10.oe1 9.0-10.oe1 2:9.0-10.oe1 2:9.0-10.oe1 virc ex rvi rview vi view ex.1.gz rvi.1.gz rview.1.gz vi.1.gz view.1.gz virc.5.gz defaults.vim /etc/ /usr/bin/ /usr/share/man/man1/ /usr/share/man/man5/ /usr/share/vim/vim90/ -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP3/standard_x86_64/25d20eed0f16ce3f408bdd0a0cc3b890-vim cpio xz 2 x86_64-openEuler-linux-gnu ASCII text ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=43c4ec021ec6dda05f2a2503066e392f8dee998f, for GNU/Linux 3.2.0, stripped troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) R R R R R R
R R R R R
R R R z/'2%T utf-8 805996425f21140747146601893516922d1b34ef0624f09cbddcf3324fe85f0d ? 7zXZ
! #,]
b2uQ{LSZ*\UkPտ
|[sBVS&~-)ҁw}L!0G<)Xd{Zɒq;^4^})4xqH FT'ET Di*}_QQ+xȄٟ^66)2q\M agHG3DL*ɞ] Vw8%l73j
F<{(Q!!zPE z|i
29EF.پyIGJ'~!ˏaT}H9o6BeT|a1H
ȣ dXjvB(tz X|*TِS'S,g
Kd `VN7`>f"qz:BYkd$QY
k#UUU^/uEaUgǭDN[A䃳" 9`YxFX?]q(;ͺ[S"1T^4yB+7e?%M;ma+j+士QĶL!pFx