www/librewolf: Return PORTREVISION - was deleted by mistake instead of bump
PR: 293914
Reported by: Ale <discipline at tiscali.it>
MFH: 2026Q1
(cherry picked from commit 6be64dd4d511e7aa24c896ad454d9791422abdde)
net/openmdns: update 0.7 -> 0.9 and take maintenership
Changelog:
https://github.com/haesbaert/mdnsd/releases/tag/0.8https://github.com/haesbaert/mdnsd/releases/tag/0.9
Major changes:
* Move mdnsl into a static libmdns library
* Silently ignore T_NULL RR records generated by legacy Airdrop on macOS
* Update rr_type_name to produce "NULL" as the name of type T_NULL(10)
* Allow us to reflect PTR packets between two interfaces/networks in the daemon.
* Fix RR leaks from cache_process()
Port changes:
* Reorder Makefile to make portlint happy
* Take port maintenership
editors/vim: Update to 9.2.0204 (security fix)
In particular, this addresses the following:
Problem: The glob() function on Unix-like systems does not escape
newline characters when expanding wildcards. A maliciously
crafted string containing '\n' can be used as a command
separator to execute arbitrary shell commands via
mch_expand_wildcards(). This depends on the user's 'shell'
setting.
Solution: Add the newline character ('\n') to the SHELL_SPECIAL
definition to ensure it is properly escaped before being
passed to the shell (pyllyukko).
Security: GHSA-w5jw-f54h-x46c
(cherry picked from commit a215214dc5d94d8906ebddd92640062e91b0fd7b)
editors/vim: Update to 9.2.0204 (security fix)
In particular, this addresses the following:
Problem: The glob() function on Unix-like systems does not escape
newline characters when expanding wildcards. A maliciously
crafted string containing '\n' can be used as a command
separator to execute arbitrary shell commands via
mch_expand_wildcards(). This depends on the user's 'shell'
setting.
Solution: Add the newline character ('\n') to the SHELL_SPECIAL
definition to ensure it is properly escaped before being
passed to the shell (pyllyukko).
Security: GHSA-w5jw-f54h-x46c