/third_party/ltp/runtest/ |
D | cve | 2 cve-2011-0999 thp01 -I 120 3 cve-2011-2183 ksm05 -I 10 4 cve-2011-2496 vma03 5 cve-2012-0957 uname04 6 cve-2014-0196 cve-2014-0196 7 cve-2015-0235 gethostbyname_r01 8 cve-2015-3290 cve-2015-3290 9 cve-2015-7550 keyctl02 10 cve-2016-4470 keyctl01.sh 11 cve-2016-4997 setsockopt03 [all …]
|
/third_party/ltp/testcases/cve/ |
D | .gitignore | 1 cve-2014-0196 2 cve-2015-3290 3 cve-2016-7042 4 cve-2016-7117 5 cve-2016-10044 6 cve-2017-2618 7 cve-2017-2671 10 cve-2017-17052 11 cve-2017-16939 12 cve-2017-17053 [all …]
|
D | Makefile | 12 cve-2016-7042: LDLIBS += $(KEYUTILS_LIBS) 14 cve-2014-0196 cve-2016-7117 cve-2017-2671 cve-2017-17052 cve-2017-17053: CFLAGS += -pthread 15 cve-2014-0196 cve-2016-7117 cve-2017-2671: LDLIBS += -lrt 18 cve-2014-0196: LDLIBS += -lutil 25 cve-2015-3290: CFLAGS += -pthread -fomit-frame-pointer
|
/third_party/node/src/ |
D | node_revert.h | 37 inline const char* RevertMessage(const reversion cve) { in RevertMessage() argument 39 switch (cve) { in RevertMessage() 51 inline void Revert(const reversion cve) { in Revert() argument 52 per_process::reverted_cve |= 1 << cve; in Revert() 53 printf("SECURITY WARNING: Reverting %s\n", RevertMessage(cve)); in Revert() 56 inline void Revert(const char* cve, std::string* error) { in Revert() argument 58 if (strcmp(cve, label) == 0) return Revert(SECURITY_REVERT_##code); in Revert() 62 *error += cve; in Revert() 66 inline bool IsReverted(const reversion cve) { in IsReverted() argument 67 return per_process::reverted_cve & (1 << cve); in IsReverted() [all …]
|
D | node.cc | 727 for (const std::string& cve : per_process::cli_options->security_reverts) { in ProcessGlobalArgs() local 728 Revert(cve.c_str(), &revert_error); in ProcessGlobalArgs()
|
/third_party/ltp/scenario_groups/ |
D | default | 29 cve
|
/third_party/glib/ |
D | glib2.spec | 386 - Type:cve 392 - Type:cve 398 - Type:cve 404 - Type:cve
|
/third_party/python/Misc/NEWS.d/next/Security/ |
D | 2022-09-07-10-42-00.gh-issue-97514.Yggdsl.rst | 15 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42919>`_.
|
D | 2022-08-07-16-53-38.gh-issue-95778.ch010gps.rst | 6 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735>`_.
|
/third_party/libpng/ |
D | libpng.spec | 114 - DESC:fix cve
|
/third_party/skia/third_party/externals/icu/source/data/misc/ |
D | keyTypeData.txt | 245 cve{""}
|
/third_party/icu/icu4c/source/data/misc/ |
D | keyTypeData.txt | 246 cve{""}
|
/third_party/node/doc/changelogs/ |
D | CHANGELOG_V18.md | 770 * [CVE-2023-44487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487): `nghttp2` Securi… 771 * [CVE-2023-45143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45143): `undici` Securit… 772 * [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity check… 773 * [CVE-2023-39333](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39333): Code injection v… 1010 * [CVE-2023-32002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32002): Policies can be… 1011 * [CVE-2023-32006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32006): Policies can be … 1012 * [CVE-2023-32559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559): Policies can be … 1596 * [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__pr… 1597 * [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585): Privilege escala… 1598 * [CVE-2023-30588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30588): Process interupt… [all …]
|
D | CHANGELOG_V16.md | 731 More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 739 More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 747 More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 755 More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 763 * \[[`9a0a189b0b`](https://github.com/nodejs/node/commit/9a0a189b0b)] - **src**: add cve reverts an… 1007 …muggling (HRS). More details will be available at [CVE-2021-22959](https://cve.mitre.org/cgi-bin/c… 1009 …ain conditions. More details will be available at [CVE-2021-22960](https://cve.mitre.org/cgi-bin/c… 1564 …etely resolved by the previous fix. You can read more about it at <https://cve.mitre.org/cgi-bin/c… 1626 …uption, to change process behavior. You can read more about it in <https://cve.mitre.org/cgi-bin/c… 1942 …information disclosures or crashes. You can read more about it in <https://cve.mitre.org/cgi-bin/c… [all …]
|
D | CHANGELOG_V012.md | 132 …ability discovered in V8, more details can be found in the CVE at <https://cve.mitre.org/cgi-bin/c…
|
D | CHANGELOG_V17.md | 939 More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 947 More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 955 More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 963 More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 971 * \[[`df3141f59b`](https://github.com/nodejs/node/commit/df3141f59b)] - **src**: add cve reverts an…
|
D | CHANGELOG_V010.md | 147 …ability discovered in V8, more details can be found in the CVE at <https://cve.mitre.org/cgi-bin/c…
|
D | CHANGELOG_V14.md | 174 More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 182 More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 190 More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 198 More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 206 * \[[`9f2c52617f`](https://github.com/nodejs/node/commit/9f2c52617f)] - **src**: add cve reverts an… 250 …muggling (HRS). More details will be available at [CVE-2021-22959](https://cve.mitre.org/cgi-bin/c… 252 …ain conditions. More details will be available at [CVE-2021-22960](https://cve.mitre.org/cgi-bin/c… 793 …etely resolved by the previous fix. You can read more about it at <https://cve.mitre.org/cgi-bin/c… 815 …uption, to change process behavior. You can read more about it in <https://cve.mitre.org/cgi-bin/c… 987 …information disclosures or crashes. You can read more about it in <https://cve.mitre.org/cgi-bin/c… [all …]
|
/third_party/ltp/doc/ |
D | C-Test-Case-Tutorial.asciidoc | 971 cve-2016-7117: LDFLAGS += -lpthread 973 cve-2014-0196: LDFLAGS += -lpthread -lutil -lrt 974 cve-2016-7117: LDFLAGS += -lpthread -lrt
|
D | c-test-tutorial-simple.txt | 970 cve-2016-7117: LDFLAGS += -lpthread 972 cve-2014-0196: LDFLAGS += -lpthread -lutil -lrt 973 cve-2016-7117: LDFLAGS += -lpthread -lrt
|
/third_party/gptfdisk/ |
D | NEWS | 86 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0256 90 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0308
|
/third_party/skia/third_party/externals/expat/expat/ |
D | Changes | 614 Details: https://libexpat.github.io/doc/cve-2017-9233/
|
/third_party/skia/third_party/externals/freetype/docs/ |
D | CHANGES | 158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999 443 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942 721 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287 798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
|
/third_party/ffmpeg/doc/ |
D | developer.texi | 822 number} issued by @url{http://cve.mitre.org/}.
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Bitcode/Reader/ |
D | BitcodeReader.cpp | 4415 cve = CaseVals.end(); cvi != cve; ++cvi) in parseFunctionBody() local
|