Mercurial > vim
view pixmaps/tb_redo.xpm @ 33780:377ed6ab612c v9.0.2110
patch 9.0.2110: [security]: overflow in ex address parsing
Commit: https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200
Author: Christian Brabandt <cb@256bit.org>
Date: Tue Nov 14 21:33:29 2023 +0100
patch 9.0.2110: [security]: overflow in ex address parsing
Problem: [security]: overflow in ex address parsing
Solution: Verify that lnum is positive, before substracting from
LONG_MAX
[security]: overflow in ex address parsing
When parsing relative ex addresses one may unintentionally cause an
overflow (because LONG_MAX - lnum will overflow for negative addresses).
So verify that lnum is actually positive before doing the overflow
check.
Signed-off-by: Christian Brabandt <cb@256bit.org>
author | Christian Brabandt <cb@256bit.org> |
---|---|
date | Thu, 16 Nov 2023 22:15:12 +0100 |
parents | 3fc0f57ecb91 |
children |
line wrap: on
line source
/* XPM */ static char * tb_redo_xpm[] = { /* width height ncolors cpp [x_hot y_hot] */ "18 18 4 1 0 0", /* colors */ " s none m none c none", ". s iconColor1 m black c #000000", "X s iconColor2 m none c #FFFFFF", "o s bottomShadowColor m black c #5D6069", /* pixels */ " ", " ", " ..... .. ", " ..XXXXX..X.o ", " .XXXXXXXXXX.o ", " .XX....XXXX.o ", " .XX.ooo.XXXX.o ", " .XX.o .XXXXX.o ", " .XX.o .......o ", " .XX.o ooo.ooo ", " .XX.o .X. ", " .XX.....XX.o ", " .XXXXXXXX.oo ", " ..XXXXX.oo ", " .....oo ", " ooooo ", " ", " "};