editors/vim: Update to 9.2.0272 (security)
This update addresses GHSA-2gmj-rpqf-pxvh (see advisory link below):
Summary (from advisory):
A bug chain in Vim allows arbitrary OS command execution when a user
opens a crafted file. The tabpanel option is missing the P_MLE flag,
allowing a modeline to inject a %{expr} expression string without
requiring modelineexpr to be enabled. Although Vim correctly
evaluates the expression inside the sandbox, autocmd_add() lacks
a check_secure() call, allowing sandboxed code to register an
autocommand that fires after the sandbox exits.Security: https://github.com/vim/vim/security/advisories/GHSA-2gmj-rpqf-pxvh
(cherry picked from commit 58d999b09c2836b4aab68748ceb27521f72a490e)