diff options
| author | Adam Weinberger <adamw@FreeBSD.org> | 2026-03-30 17:00:39 +0000 |
|---|---|---|
| committer | Adam Weinberger <adamw@FreeBSD.org> | 2026-03-30 17:03:59 +0000 |
| commit | 58d999b09c2836b4aab68748ceb27521f72a490e (patch) | |
| tree | 93cef93a19786f91110af461ee3578f92c4c7c24 /games/qnetwalk/(public-mirror) | |
| parent | 9f80c45f94cf187722967f71bc3b265519b8f987 (diff) | |
This update addresses GHSA-2gmj-rpqf-pxvh (see advisory link below):
Summary (from advisory):
A bug chain in Vim allows arbitrary OS command execution when a user
opens a crafted file. The tabpanel option is missing the P_MLE flag,
allowing a modeline to inject a %{expr} expression string without
requiring modelineexpr to be enabled. Although Vim correctly
evaluates the expression inside the sandbox, autocmd_add() lacks
a check_secure() call, allowing sandboxed code to register an
autocommand that fires after the sandbox exits.
Security: https://github.com/vim/vim/security/advisories/GHSA-2gmj-rpqf-pxvh
Diffstat (limited to 'games/qnetwalk/(public-mirror)')
0 files changed, 0 insertions, 0 deletions
