Mercurial > vim
view pixmaps/tb_jump.xpm @ 33782:15593f77c5c2 v9.0.2111
patch 9.0.2111: [security]: overflow in get_number
Commit: https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968
Author: Christian Brabandt <cb@256bit.org>
Date: Tue Nov 14 21:58:26 2023 +0100
patch 9.0.2111: [security]: overflow in get_number
Problem: [security]: overflow in get_number
Solution: Return 0 when the count gets too large
[security]: overflow in get_number
When using the z= command, we may overflow the count with values larger
than MAX_INT. So verify that we do not overflow and in case when an
overflow is detected, simply return 0
Signed-off-by: Christian Brabandt <cb@256bit.org>
author | Christian Brabandt <cb@256bit.org> |
---|---|
date | Thu, 16 Nov 2023 22:15:14 +0100 |
parents | 3fc0f57ecb91 |
children |
line wrap: on
line source
/* XPM */ static char * tb_jump_xpm[] = { /* width height ncolors cpp [x_hot y_hot] */ "18 18 6 1 0 0", /* colors */ " s none m none c none", ". m black c #888800", "X s bottomShadowColor m black c #5D6069", "o s iconColor6 m none c #FFFF00", "O s iconColor1 m black c #000000", "+ s topShadowColor m none c #DCDEE5", /* pixels */ " ", " ", " ", " ", " .............. ", " .XooooooooooooOX", " .XoooooooooooooOX", ".Xo+X+ooooooooooOX", ".ooXOXooooooooooOX", "Xoo+X+ooooooooooOX", "XOooooooooooooooOX", " XOoooooooooooooOX", " XOOOOOOOOOOOOOOX", " XXXXXXXXXXXXXXX", " ", " ", " ", " "};