view pixmaps/tb_redo.xpm @ 33780:377ed6ab612c v9.0.2110

patch 9.0.2110: [security]: overflow in ex address parsing Commit: https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200 Author: Christian Brabandt <cb@256bit.org> Date: Tue Nov 14 21:33:29 2023 +0100 patch 9.0.2110: [security]: overflow in ex address parsing Problem: [security]: overflow in ex address parsing Solution: Verify that lnum is positive, before substracting from LONG_MAX [security]: overflow in ex address parsing When parsing relative ex addresses one may unintentionally cause an overflow (because LONG_MAX - lnum will overflow for negative addresses). So verify that lnum is actually positive before doing the overflow check. Signed-off-by: Christian Brabandt <cb@256bit.org>
author Christian Brabandt <cb@256bit.org>
date Thu, 16 Nov 2023 22:15:12 +0100
parents 3fc0f57ecb91
children
line wrap: on
line source

/* XPM */
static char * tb_redo_xpm[] = {
/* width height ncolors cpp [x_hot y_hot] */
"18 18 4 1 0 0",
/* colors */
" 	s none	m none	c none",
".	s iconColor1	m black	c #000000",
"X	s iconColor2	m none	c #FFFFFF",
"o	s bottomShadowColor	m black	c #5D6069",
/* pixels */
"                  ",
"                  ",
"      .....  ..   ",
"    ..XXXXX..X.o  ",
"   .XXXXXXXXXX.o  ",
"   .XX....XXXX.o  ",
"  .XX.ooo.XXXX.o  ",
"  .XX.o .XXXXX.o  ",
"  .XX.o .......o  ",
"  .XX.o  ooo.ooo  ",
"  .XX.o    .X.    ",
"   .XX.....XX.o   ",
"   .XXXXXXXX.oo   ",
"    ..XXXXX.oo    ",
"      .....oo     ",
"       ooooo      ",
"                  ",
"                  "};