Home
last modified time | relevance | path

Searched refs:cve (Results 1 – 25 of 35) sorted by relevance

12

/third_party/ltp/runtest/
Dcve2 cve-2011-0999 thp01 -I 120
3 cve-2011-2183 ksm05 -I 10
4 cve-2011-2496 vma03
5 cve-2012-0957 uname04
6 cve-2014-0196 cve-2014-0196
7 cve-2015-0235 gethostbyname_r01
8 cve-2015-3290 cve-2015-3290
9 cve-2015-7550 keyctl02
10 cve-2016-4470 keyctl01.sh
11 cve-2016-4997 setsockopt03
[all …]
/third_party/ltp/testcases/cve/
D.gitignore1 cve-2014-0196
2 cve-2015-3290
3 cve-2016-7042
4 cve-2016-7117
5 cve-2016-10044
6 cve-2017-2618
7 cve-2017-2671
10 cve-2017-17052
11 cve-2017-16939
12 cve-2017-17053
[all …]
DMakefile12 cve-2016-7042: LDLIBS += $(KEYUTILS_LIBS)
14 cve-2014-0196 cve-2016-7117 cve-2017-2671 cve-2017-17052 cve-2017-17053: CFLAGS += -pthread
15 cve-2014-0196 cve-2016-7117 cve-2017-2671: LDLIBS += -lrt
18 cve-2014-0196: LDLIBS += -lutil
25 cve-2015-3290: CFLAGS += -pthread -fomit-frame-pointer
/third_party/node/src/
Dnode_revert.h37 inline const char* RevertMessage(const reversion cve) { in RevertMessage() argument
39 switch (cve) { in RevertMessage()
51 inline void Revert(const reversion cve) { in Revert() argument
52 per_process::reverted_cve |= 1 << cve; in Revert()
53 printf("SECURITY WARNING: Reverting %s\n", RevertMessage(cve)); in Revert()
56 inline void Revert(const char* cve, std::string* error) { in Revert() argument
58 if (strcmp(cve, label) == 0) return Revert(SECURITY_REVERT_##code); in Revert()
62 *error += cve; in Revert()
66 inline bool IsReverted(const reversion cve) { in IsReverted() argument
67 return per_process::reverted_cve & (1 << cve); in IsReverted()
[all …]
Dnode.cc727 for (const std::string& cve : per_process::cli_options->security_reverts) { in ProcessGlobalArgs() local
728 Revert(cve.c_str(), &revert_error); in ProcessGlobalArgs()
/third_party/ltp/scenario_groups/
Ddefault29 cve
/third_party/glib/
Dglib2.spec386 - Type:cve
392 - Type:cve
398 - Type:cve
404 - Type:cve
/third_party/python/Misc/NEWS.d/next/Security/
D2022-09-07-10-42-00.gh-issue-97514.Yggdsl.rst15 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42919>`_.
D2022-08-07-16-53-38.gh-issue-95778.ch010gps.rst6 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735>`_.
/third_party/libpng/
Dlibpng.spec114 - DESC:fix cve
/third_party/skia/third_party/externals/icu/source/data/misc/
DkeyTypeData.txt245 cve{""}
/third_party/icu/icu4c/source/data/misc/
DkeyTypeData.txt246 cve{""}
/third_party/node/doc/changelogs/
DCHANGELOG_V18.md770 * [CVE-2023-44487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487): `nghttp2` Securi…
771 * [CVE-2023-45143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45143): `undici` Securit…
772 * [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity check…
773 * [CVE-2023-39333](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39333): Code injection v…
1010 * [CVE-2023-32002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32002): Policies can be…
1011 * [CVE-2023-32006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32006): Policies can be …
1012 * [CVE-2023-32559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559): Policies can be …
1596 * [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__pr…
1597 * [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585): Privilege escala…
1598 * [CVE-2023-30588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30588): Process interupt…
[all …]
DCHANGELOG_V16.md731 More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
739 More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
747 More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
755 More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
763 * \[[`9a0a189b0b`](https://github.com/nodejs/node/commit/9a0a189b0b)] - **src**: add cve reverts an…
1007 …muggling (HRS). More details will be available at [CVE-2021-22959](https://cve.mitre.org/cgi-bin/c…
1009 …ain conditions. More details will be available at [CVE-2021-22960](https://cve.mitre.org/cgi-bin/c…
1564 …etely resolved by the previous fix. You can read more about it at <https://cve.mitre.org/cgi-bin/c…
1626 …uption, to change process behavior. You can read more about it in <https://cve.mitre.org/cgi-bin/c…
1942 …information disclosures or crashes. You can read more about it in <https://cve.mitre.org/cgi-bin/c…
[all …]
DCHANGELOG_V012.md132 …ability discovered in V8, more details can be found in the CVE at <https://cve.mitre.org/cgi-bin/c…
DCHANGELOG_V17.md939 More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
947 More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
955 More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
963 More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
971 * \[[`df3141f59b`](https://github.com/nodejs/node/commit/df3141f59b)] - **src**: add cve reverts an…
DCHANGELOG_V010.md147 …ability discovered in V8, more details can be found in the CVE at <https://cve.mitre.org/cgi-bin/c…
DCHANGELOG_V14.md174 More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
182 More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
190 More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
198 More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C…
206 * \[[`9f2c52617f`](https://github.com/nodejs/node/commit/9f2c52617f)] - **src**: add cve reverts an…
250 …muggling (HRS). More details will be available at [CVE-2021-22959](https://cve.mitre.org/cgi-bin/c…
252 …ain conditions. More details will be available at [CVE-2021-22960](https://cve.mitre.org/cgi-bin/c…
793 …etely resolved by the previous fix. You can read more about it at <https://cve.mitre.org/cgi-bin/c…
815 …uption, to change process behavior. You can read more about it in <https://cve.mitre.org/cgi-bin/c…
987 …information disclosures or crashes. You can read more about it in <https://cve.mitre.org/cgi-bin/c…
[all …]
/third_party/ltp/doc/
DC-Test-Case-Tutorial.asciidoc971 cve-2016-7117: LDFLAGS += -lpthread
973 cve-2014-0196: LDFLAGS += -lpthread -lutil -lrt
974 cve-2016-7117: LDFLAGS += -lpthread -lrt
Dc-test-tutorial-simple.txt970 cve-2016-7117: LDFLAGS += -lpthread
972 cve-2014-0196: LDFLAGS += -lpthread -lutil -lrt
973 cve-2016-7117: LDFLAGS += -lpthread -lrt
/third_party/gptfdisk/
DNEWS86 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0256
90 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0308
/third_party/skia/third_party/externals/expat/expat/
DChanges614 Details: https://libexpat.github.io/doc/cve-2017-9233/
/third_party/skia/third_party/externals/freetype/docs/
DCHANGES158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
443 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
721 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
/third_party/ffmpeg/doc/
Ddeveloper.texi822 number} issued by @url{http://cve.mitre.org/}.
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Bitcode/Reader/
DBitcodeReader.cpp4415 cve = CaseVals.end(); cvi != cve; ++cvi) in parseFunctionBody() local

12