Date: Sat, 15 Jun 2019 15:12:47 +0000 From: Alexey Dokuchaev <danfe@freebsd.org> To: Adam Weinberger <adamw@freebsd.org> Cc: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: Re: svn commit: r504132 - head/security/vuxml Message-ID: <20190615151247.GA24087@FreeBSD.org> In-Reply-To: <201906131841.x5DIfuSb069885@repo.freebsd.org> References: <201906131841.x5DIfuSb069885@repo.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jun 13, 2019 at 06:41:56PM +0000, Adam Weinberger wrote: > New Revision: 504132 > URL: https://svnweb.freebsd.org/changeset/ports/504132 > > Log: > Add entry for Vim/NeoVim arbitrary code execution > > Modified: > head/security/vuxml/vuln.xml Do we package Vim/NeoVim with modelines enabled by default? I've seen people say that in some distributions, default packages were not affected because their maintainers deliberately disable modelines, e.g. in Debian from 2007: * debian/runtime/debian.vim.in - set 'nomodeline' by default since modelines have historically been a source of security/resource vulnerabilities. Users should have to explicitly enable the option to assume the associated risks. Also, from Gentoo's /etc/vim/vimrc: We don't allow modelines by default. See bug #14088 and bug #73715. basis by adding "set modeline" to your ~/.vimrc file. This sounds like a good idea. Actually, any similar feature that allows to execute something based on user input should be disabled by default, because these things are very hard to get right (unless you're Daniel Bernstein). ./danfe
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20190615151247.GA24087>