Home
last modified time | relevance | path

Searched refs:cve (Results 1 – 25 of 30) sorted by relevance

12

/third_party/ltp/runtest/
Dcve2 cve-2011-0999 thp01 -I 120
3 cve-2011-2183 ksm05 -I 10
4 cve-2011-2496 vma03
5 cve-2012-0957 uname04
6 cve-2014-0196 cve-2014-0196
7 cve-2015-0235 gethostbyname_r01
8 cve-2015-7550 keyctl02
9 cve-2016-4470 keyctl01.sh
10 cve-2015-3290 cve-2015-3290
11 cve-2016-4997 setsockopt03
[all …]
/third_party/ltp/testcases/cve/
D.gitignore1 cve-2014-0196
2 cve-2015-3290
3 cve-2016-7042
4 cve-2016-7117
5 cve-2016-10044
6 cve-2017-2618
7 cve-2017-2671
10 cve-2017-17052
11 cve-2017-16939
12 cve-2017-17053
DMakefile12 cve-2016-7042: LDLIBS += $(KEYUTILS_LIBS)
14 cve-2014-0196 cve-2016-7117 cve-2017-2671 cve-2017-17052 cve-2017-17053: CFLAGS += -pthread
15 cve-2014-0196 cve-2016-7117 cve-2017-2671: LDLIBS += -lrt
18 cve-2014-0196: LDLIBS += -lutil
25 cve-2015-3290: CFLAGS += -pthread -fomit-frame-pointer
/third_party/node/src/
Dnode_revert.h39 inline const char* RevertMessage(const reversion cve) { in RevertMessage() argument
41 switch (cve) { in RevertMessage()
53 inline void Revert(const reversion cve) { in Revert() argument
54 per_process::reverted_cve |= 1 << cve; in Revert()
55 printf("SECURITY WARNING: Reverting %s\n", RevertMessage(cve)); in Revert()
58 inline void Revert(const char* cve, std::string* error) { in Revert() argument
60 if (strcmp(cve, label) == 0) return Revert(SECURITY_REVERT_##code); in Revert()
64 *error += cve; in Revert()
68 inline bool IsReverted(const reversion cve) { in IsReverted() argument
69 return per_process::reverted_cve & (1 << cve); in IsReverted()
[all …]
Dnode.cc777 for (const std::string& cve : per_process::cli_options->security_reverts) { in ProcessGlobalArgs() local
778 Revert(cve.c_str(), &revert_error); in ProcessGlobalArgs()
/third_party/chromium/patch/
DREADME.md8 | 0001-cve.patch | 针对Chromium CVE漏洞的修复 |
/third_party/ltp/scenario_groups/
Ddefault29 cve
/third_party/mindspore/
DRELEASE.md2582cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656), [CVE-2020-13871](https://cve.mitre.org/cgi…
2583 …- Libjpeg-turbo : Update libjpeg-turbo to 2.0.4 to handle [CVE-2020-13790](https://cve.mitre.org/c…
2699cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656), [CVE-2020-13871](https://cve.mitre.org/cgi…
2700 …- Libjpeg-turbo : Update libjpeg-turbo to 2.0.4 to handle [CVE-2020-13790](https://cve.mitre.org/c…
2778cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656), [CVE-2020-13871](https://cve.mitre.org/cgi…
2779 …- Libjpeg-turbo : Update libjpeg-turbo to 2.0.4 to handle [CVE-2020-13790](https://cve.mitre.org/c…
2881cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656), [CVE-2020-13871](https://cve.mitre.org/cgi…
/third_party/flutter/skia/third_party/externals/icu/source/data/misc/
DkeyTypeData.txt242 cve{""}
/third_party/skia/third_party/externals/icu/source/data/misc/
DkeyTypeData.txt245 cve{""}
/third_party/icu/icu4c/source/data/misc/
DkeyTypeData.txt245 cve{""}
/third_party/curl/docs/
DSECURITY-PROCESS.md63 [HackerOne](https://docs.hackerone.com/programs/cve-requests.html)
/third_party/ltp/doc/
Dc-test-tutorial-simple.txt970 cve-2016-7117: LDFLAGS += -lpthread
972 cve-2014-0196: LDFLAGS += -lpthread -lutil -lrt
973 cve-2016-7117: LDFLAGS += -lpthread -lrt
/third_party/gptfdisk/
DNEWS86 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0256
90 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0308
/third_party/skia/third_party/externals/expat/expat/
DChanges576 Details: https://libexpat.github.io/doc/cve-2017-9233/
/third_party/node/doc/changelogs/
DCHANGELOG_V012.md126 …rability discovered in V8, more details can be found in the CVE at https://cve.mitre.org/cgi-bin/c…
DCHANGELOG_V14.md88 * **[CVE-2022-32212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212)**: DNS rebindin…
89 * **[CVE-2022-32213](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213)**: bypass via o…
90 * **[CVE-2022-35256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256)**: HTTP Request…
280 More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
288 More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
296 More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
304 More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
312 * \[[`9f2c52617f`](https://github.com/nodejs/node/commit/9f2c52617f)] - **src**: add cve reverts an…
354 …muggling (HRS). More details will be available at [CVE-2021-22959](https://cve.mitre.org/cgi-bin/c…
356 …ain conditions. More details will be available at [CVE-2021-22960](https://cve.mitre.org/cgi-bin/c…
[all …]
DCHANGELOG_V010.md142 …rability discovered in V8, more details can be found in the CVE at https://cve.mitre.org/cgi-bin/c…
/third_party/expat/
DChanges591 Details: https://libexpat.github.io/doc/cve-2017-9233/
/third_party/freetype/docs/
DCHANGES8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
293 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
571 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
572 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
/third_party/skia/third_party/externals/freetype/docs/
DCHANGES158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
443 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
721 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
/third_party/ffmpeg/doc/
Ddeveloper.texi806 number} issued by @url{http://cve.mitre.org/}.
/third_party/flutter/skia/third_party/externals/freetype/docs/
DCHANGES192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
547 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Bitcode/Reader/
DBitcodeReader.cpp4415 cve = CaseVals.end(); cvi != cve; ++cvi) in parseFunctionBody() local
/third_party/python/Doc/c-api/
Dinit.rst624 See `CVE-2008-5983 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983>`_.

12