aboutsummaryrefslogtreecommitdiff
path: root/games/qnetwalk/(public-mirror)
diff options
context:
space:
mode:
authorAdam Weinberger <adamw@FreeBSD.org>2026-03-30 17:00:39 +0000
committerAdam Weinberger <adamw@FreeBSD.org>2026-03-30 17:03:59 +0000
commit58d999b09c2836b4aab68748ceb27521f72a490e (patch)
tree93cef93a19786f91110af461ee3578f92c4c7c24 /games/qnetwalk/(public-mirror)
parent9f80c45f94cf187722967f71bc3b265519b8f987 (diff)
editors/vim: Update to 9.2.0272 (security)HEADmain
This update addresses GHSA-2gmj-rpqf-pxvh (see advisory link below): Summary (from advisory): A bug chain in Vim allows arbitrary OS command execution when a user opens a crafted file. The tabpanel option is missing the P_MLE flag, allowing a modeline to inject a %{expr} expression string without requiring modelineexpr to be enabled. Although Vim correctly evaluates the expression inside the sandbox, autocmd_add() lacks a check_secure() call, allowing sandboxed code to register an autocommand that fires after the sandbox exits. Security: https://github.com/vim/vim/security/advisories/GHSA-2gmj-rpqf-pxvh
Diffstat (limited to 'games/qnetwalk/(public-mirror)')
0 files changed, 0 insertions, 0 deletions