view pixmaps/tb_minwidth.xpm @ 33780:377ed6ab612c v9.0.2110

patch 9.0.2110: [security]: overflow in ex address parsing Commit: https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200 Author: Christian Brabandt <cb@256bit.org> Date: Tue Nov 14 21:33:29 2023 +0100 patch 9.0.2110: [security]: overflow in ex address parsing Problem: [security]: overflow in ex address parsing Solution: Verify that lnum is positive, before substracting from LONG_MAX [security]: overflow in ex address parsing When parsing relative ex addresses one may unintentionally cause an overflow (because LONG_MAX - lnum will overflow for negative addresses). So verify that lnum is actually positive before doing the overflow check. Signed-off-by: Christian Brabandt <cb@256bit.org>
author Christian Brabandt <cb@256bit.org>
date Thu, 16 Nov 2023 22:15:12 +0100
parents 3fc0f57ecb91
children
line wrap: on
line source

/* XPM */
static char * tb_minwidth_xpm[] = {
/* width height ncolors cpp [x_hot y_hot] */
"18 18 5 1 0 0",
/* colors */
" 	s none	m none	c none",
".	s topShadowColor	m none	c #DCDEE5",
"X	s iconColor1	m black	c #000000",
"o	s iconColor2	m none	c #FFFFFF",
"O	s bottomShadowColor	m black	c #5D6069",
/* pixels */
"                  ",
"                  ",
"     .XXXXXX      ",
"     .X...oX      ",
"     .X...oX      ",
"     .X...oX      ",
" X   .X.o.oXO   X ",
" XX  .X...oXO  XX ",
" XXX .X...oXO XXX ",
" XX  .X...oXO  XX ",
" X   .X...oXO   X ",
"     .X...oXO     ",
"     .X..ooXO     ",
"     .XooooXO     ",
"     .XXXXXXO     ",
"        OOOOO     ",
"                  ",
"                  "};