From d4ddfafc2ac07d37a8c851ceb453f8872a0840ef Mon Sep 17 00:00:00 2001 From: Bram Moolenaar Date: Thu, 2 Dec 2010 14:48:14 +0100 Subject: [PATCH] updated for version 7.3.070 Problem: Can set environment variables in the sandbox, could be abused. Solution: Disallow it. --- src/eval.c | 2 +- src/version.c | 2 ++ 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/src/eval.c b/src/eval.c index 7c3abf1f5..356461742 100644 --- a/src/eval.c +++ b/src/eval.c @@ -2326,7 +2326,7 @@ ex_let_one(arg, tv, copy, endchars, op) else if (endchars != NULL && vim_strchr(endchars, *skipwhite(arg)) == NULL) EMSG(_(e_letunexp)); - else + else if (!check_secure()) { c1 = name[len]; name[len] = NUL; diff --git a/src/version.c b/src/version.c index 3dfb975de..5d96698a9 100644 --- a/src/version.c +++ b/src/version.c @@ -714,6 +714,8 @@ static char *(features[]) = static int included_patches[] = { /* Add new patch number below this line */ +/**/ + 70, /**/ 69, /**/