Mercurial > vim
view pixmaps/tb_load_session.xpm @ 33778:06ad070cda83 v9.0.2109
patch 9.0.2109: [security]: overflow in nv_z_get_count
Commit: https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca
Author: Christian Brabandt <cb@256bit.org>
Date: Tue Nov 14 21:02:30 2023 +0100
patch 9.0.2109: [security]: overflow in nv_z_get_count
Problem: [security]: overflow in nv_z_get_count
Solution: break out, if count is too large
When getting the count for a normal z command, it may overflow for large
counts given. So verify, that we can safely store the result in a long.
Signed-off-by: Christian Brabandt <cb@256bit.org>
author | Christian Brabandt <cb@256bit.org> |
---|---|
date | Thu, 16 Nov 2023 22:15:11 +0100 |
parents | 3fc0f57ecb91 |
children |
line wrap: on
line source
/* XPM */ static char * tb_load_session_xpm[] = { /* width height ncolors cpp [x_hot y_hot] */ "18 18 9 1 0 0", /* colors */ " s none m none c none", ". m black c #880000", "X s iconColor3 m black c #FF0000", "o s iconColor1 m black c #000000", "O s iconColor2 m none c #FFFFFF", "+ s iconGray2 m none c #bdbdbd", "@ s iconGray5 m black c #737373", "# s iconGray4 m none c #949494", "$ s bottomShadowColor m black c #5D6069", /* pixels */ " .. ", " .XX. ", " .XXXX. ", " ...XX... ", " .XX. ", " .XX. ", " .XX. ", " .... ", " ooooooooooooo ", " oOOOOOOOOOO++@o ", " oOOOOOOOOOOOO#@o ", " oO+++++++++XX#@o ", " oO+++++++++++#@o ", " oOoooooooooo+#@o$", " oOOOOOOOOOOO+#@o$", " o+###########@o$ ", " ooooooooooooo$ ", " $$$$$$$$$$$ "};