view pixmaps/tb_jump.xpm @ 33782:15593f77c5c2 v9.0.2111

patch 9.0.2111: [security]: overflow in get_number Commit: https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968 Author: Christian Brabandt <cb@256bit.org> Date: Tue Nov 14 21:58:26 2023 +0100 patch 9.0.2111: [security]: overflow in get_number Problem: [security]: overflow in get_number Solution: Return 0 when the count gets too large [security]: overflow in get_number When using the z= command, we may overflow the count with values larger than MAX_INT. So verify that we do not overflow and in case when an overflow is detected, simply return 0 Signed-off-by: Christian Brabandt <cb@256bit.org>
author Christian Brabandt <cb@256bit.org>
date Thu, 16 Nov 2023 22:15:14 +0100
parents 3fc0f57ecb91
children
line wrap: on
line source

/* XPM */
static char * tb_jump_xpm[] = {
/* width height ncolors cpp [x_hot y_hot] */
"18 18 6 1 0 0",
/* colors */
" 	s none	m none	c none",
".	m black	c #888800",
"X	s bottomShadowColor	m black	c #5D6069",
"o	s iconColor6	m none	c #FFFF00",
"O	s iconColor1	m black	c #000000",
"+	s topShadowColor	m none	c #DCDEE5",
/* pixels */
"                  ",
"                  ",
"                  ",
"                  ",
"   .............. ",
"  .XooooooooooooOX",
" .XoooooooooooooOX",
".Xo+X+ooooooooooOX",
".ooXOXooooooooooOX",
"Xoo+X+ooooooooooOX",
"XOooooooooooooooOX",
" XOoooooooooooooOX",
"  XOOOOOOOOOOOOOOX",
"   XXXXXXXXXXXXXXX",
"                  ",
"                  ",
"                  ",
"                  "};