Package vim-enhanced: Information
Binary package: vim-enhanced
Version: 9.1.0050-alt2
Architecture: i586
Build time: Mar 1, 2024, 12:45 PM in the task #341493
Source package: vim
Category: Editors
Report package bugDownload: vim-enhanced-9.1.0050-alt2.i586.rpm
Home page: http://www.vim.org
License: Vim
Summary: A terminal-based, full-featured version of the VIM editor
Description:
VIM (VIsual editor iMproved) is an updated and improved version of the vi editor. Vi was the first real screen-based editor for UNIX, and is still very popular. VIM improves on vi by adding new features: multiple windows, multi-level undo, block highlighting and more. The vim-enhanced package contains a version of VIM with extra, recently introduced features like Python and Perl interpreters. Install the vim-enhanced package if you'd like to use a full-featured VIM, but you don't want to use GUI version of VIM. You'll also need to install the vim-common package.
Maintainer: Gleb Fotengauer-Malinovskiy
List of contributors:
Gleb Fotengauer-Malinovskiy
Alexander Danilov
Dmitry V. Levin
Igor Vlasenko
Andrey Cherepanov
Vladimir D. Seleznev
Led
Vladimir Lettiev
Vitaly Kuznetsov
Alexey Tourbin
Sir Raorn
Eugeny A. Rostovtsev
Kirill A. Shutemov
Alexander Bokovoy
Stanislav Ievlev
sa
Gleb Fotengauer-Malinovskiy
Alexander Danilov
Dmitry V. Levin
Igor Vlasenko
Andrey Cherepanov
Vladimir D. Seleznev
Led
Vladimir Lettiev
Vitaly Kuznetsov
Alexey Tourbin
Sir Raorn
Eugeny A. Rostovtsev
Kirill A. Shutemov
Alexander Bokovoy
Stanislav Ievlev
sa
Last changed
Jan. 25, 2024 Gleb Fotengauer-Malinovskiy 4:9.1.0050-alt2
- Reverted upstream commit "patch 9.1.0041: xxd -i may generate incorrect C statements" to fix regression in xxd -i output (ALT#49180).
Jan. 24, 2024 Gleb Fotengauer-Malinovskiy 4:9.1.0050-alt1
- Updated to v9.1.0050. - Applied some tweaks to specfile highlight (thx Vitaly Chikunov).
Nov. 29, 2023 Alexander Danilov 4:9.0.2136-alt1
- Updated to v9.0.2136 (fixes CVE-2023-48237, CVE-2023-48236, CVE-2023-48235, CVE-2023-48234, CVE-2023-48233, CVE-2023-48232, CVE-2023-48231).