view runtime/vim16x16.xpm @ 33778:06ad070cda83 v9.0.2109

patch 9.0.2109: [security]: overflow in nv_z_get_count Commit: https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca Author: Christian Brabandt <cb@256bit.org> Date: Tue Nov 14 21:02:30 2023 +0100 patch 9.0.2109: [security]: overflow in nv_z_get_count Problem: [security]: overflow in nv_z_get_count Solution: break out, if count is too large When getting the count for a normal z command, it may overflow for large counts given. So verify, that we can safely store the result in a long. Signed-off-by: Christian Brabandt <cb@256bit.org>
author Christian Brabandt <cb@256bit.org>
date Thu, 16 Nov 2023 22:15:11 +0100
parents 3fc0f57ecb91
children 8f04cf65ecff
line wrap: on
line source

/* XPM */
static char * vim16x16[] = {
"16 16 8 1",
" 	c None",
".	c #000000",
"+	c #000080",
"@	c #008000",
"#	c #00FF00",
"$	c #808080",
"%	c #C0C0C0",
"&	c #FFFFFF",
"  .....#. ....  ",
" .&&&&&.@.&&&&. ",
" .%%%%%$..%%%%$.",
"  .%%%$.@.&%%$. ",
"  .%%%$..&%%$.  ",
"  .%%%$.&%%$..  ",
" #.%%%$&%%$.@@. ",
"#@.%%%&%%$.@@@@.",
".@.%%%%%..@@@@+ ",
" ..%%%%.%...@.  ",
"  .%%%%...%%.%. ",
"  .%%%.%%.%%%%%.",
"  .%%$..%.%.%.%.",
"  .%$.@.%.%.%.%.",
"   .. .%%.%.%.%.",
"       .. . . . "};